On 3/6/2012 7:40 AM, Clark Morris wrote:
On 5 Mar 2012 23:38:50 -0800, in bit.listserv.ibm-main you wrote:To understand what it does study the two trace entries below (GTF is your friend): SVC CODE.... 109 ASCB.... 00F95200 CPU..... 0000 PSW..... 07850000 8000006D 00000000 0C53B222 TCB..... 00AC8300 R15..... 0000000B R0...... 00000000 R1...... 00000001 GMT-03/06/2012 06:59:08.693767 LOC-03/05/2012 22:59:08.693767 SVCR CODE.... 109 ASCB.... 00F95200 CPU..... 0000 PSW..... 07140000 8000006D 00000000 0C53B222 TCB..... 00AC8300 R15..... 00000000 R0...... 00000000 R1...... 00000001 GMT-03/06/2012 06:59:08.693799 LOC-03/05/2012 22:59:08.693799How does the system verify that the caller is the intended caller versus an impostor?
Suffice to say that it does. My intent was not to explain the intricacies of this interface -- smart programmers can likely figure that out for themselves -- but rather to dispel the myth that such interfaces necessarily represent an exposure. This is IBM code!!
The above notwithstanding, I don't think anyone at IBM or elsewhere would recommend this technique for brand new, 21st-century development. Making it secure is a tricky business that requires a deep understanding of system internals. There are much better interfaces available to modern developers on z/OS that guarantee integrity without having to work so hard.
-- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 310-338-0400 x318 [email protected] http://www.phoenixsoftware.com/ ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN

