On 3/6/2012 7:40 AM, Clark Morris wrote:
On 5 Mar 2012 23:38:50 -0800, in bit.listserv.ibm-main you wrote:

To understand what it does study the two trace entries below (GTF is your 
friend):

SVC   CODE.... 109      ASCB.... 00F95200 CPU..... 0000
                         PSW..... 07850000 8000006D 00000000 0C53B222
                         TCB..... 00AC8300 R15..... 0000000B R0...... 00000000
                         R1...... 00000001
                GMT-03/06/2012 06:59:08.693767  LOC-03/05/2012 22:59:08.693767

SVCR  CODE.... 109      ASCB.... 00F95200 CPU..... 0000
                         PSW..... 07140000 8000006D 00000000 0C53B222
                         TCB..... 00AC8300 R15..... 00000000 R0...... 00000000
                         R1...... 00000001
                GMT-03/06/2012 06:59:08.693799  LOC-03/05/2012 22:59:08.693799

How does the system verify that the caller is the intended caller versus an impostor?

Suffice to say that it does. My intent was not to explain the intricacies of this interface -- smart programmers can likely figure that out for themselves -- but rather to dispel the myth that such interfaces necessarily represent an exposure. This is IBM code!!

The above notwithstanding, I don't think anyone at IBM or elsewhere would recommend this technique for brand new, 21st-century development. Making it secure is a tricky business that requires a deep understanding of system internals. There are much better interfaces available to modern developers on z/OS that guarantee integrity without having to work so hard.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
[email protected]
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to