Bill, You are absolutely correct in that this change doesn't really provide much security. I'm looking at it from a different aspect, that of removing one additional way of shooting oneself in the foot. If not you (you being collective, not just Bill), how many of your colleagues (either in the systems programming area or application developers/operations) have had a dataset deleted, only to have a new one allocated directly on top of the old one with a compatible set of DCB information, and have somebody inadvertently run a program that read the old data. I know it has happened more than once where I've worked over the years.
I'm sure this change will result (and has resulted) in fewer holes in feet. :-) Rex -----Original Message----- From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of Bill Fairchild Sent: Monday, March 12, 2012 11:09 AM To: [email protected] Subject: Re: IEFBR14 Writing an EOF record at the beginning of the data set does indeed "help prevent programs from reading old data when a data set is read immediately after being allocated", but the way it does this results in preventing the reading of old data only from the first track. If a program can read beyond this first track (which is not difficult to do even in an unauthorized program), then the program can still read all the rest of the old data in the allocated tracks. The only way truly to prevent a program from reading any of the old data is to erase each allocated track, either when the old data set is deleted or when the new data set is allocated. Erasing is a very expensive process in terms of DASD utilization and elapsed time, which is why it is almost never done. This is perhaps another example of "security through obscurity", which has been discussed lately under thread subjects starting with " Program FLIH backdoor ". I call it obscurity since getting beyond the first ! track deters most programs, but is not difficult if you know the "obscure" fact that it is quite easy to do if you want to. Bill Fairchild The information contained in this e-mail may contain confidential and/or privileged information and is intended for the sole use of the intended recipient. If you are not the intended recipient, you are hereby notified that any unauthorized use, disclosure, distribution or copying of this communication is strictly prohibited and that you will be held responsible for any such unauthorized activity, including liability for any resulting damages. As appropriate, such incident(s) may also be reported to law enforcement. If you received this e-mail in error, please reply to sender and destroy or delete the message and any attachments. Thank you. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN

