Bill,

You are absolutely correct in that this change doesn't really provide much 
security.  I'm looking at it from a different aspect, that of removing one 
additional way of shooting oneself in the foot.  If not you (you being 
collective, not just Bill), how many of your colleagues (either in the systems 
programming area or application developers/operations) have had a dataset 
deleted, only to have a new one allocated directly on top of the old one with a 
compatible set of DCB information, and have somebody inadvertently run a 
program that read the old data.  I know it has happened more than once where 
I've worked over the years.

I'm sure this change will result (and has resulted) in fewer holes in feet.  :-)

Rex

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
Bill Fairchild
Sent: Monday, March 12, 2012 11:09 AM
To: [email protected]
Subject: Re: IEFBR14

Writing an EOF record at the beginning of the data set does indeed "help 
prevent programs from reading old data when a data set is read immediately 
after being allocated", but the way it does this results in preventing the 
reading of old data only from the first track.  If a program can read beyond 
this first track (which is not difficult to do even in an unauthorized 
program), then the program can still read all the rest of the old data in the 
allocated tracks.  The only way truly to prevent a program from reading any of 
the old data is to erase each allocated track, either when the old data set is 
deleted or when the new data set is allocated.  Erasing is a very expensive 
process in terms of DASD utilization and elapsed time, which is why it is 
almost never done.  This is perhaps another example of "security through 
obscurity", which has been discussed lately under thread subjects starting with 
" Program FLIH backdoor ".  I call it obscurity since getting beyond the first !
 track deters most programs, but is not difficult if you know the "obscure" 
fact that it is quite easy to do if you want to.

Bill Fairchild

The information contained in this e-mail may contain confidential and/or 
privileged information and is intended for the sole use of the intended 
recipient. If you are not the intended recipient, you are hereby notified that 
any unauthorized use, disclosure, distribution or copying of this communication 
is strictly prohibited and that you will be held responsible for any such 
unauthorized activity, including liability for any resulting damages. As 
appropriate, such incident(s) may also be reported to law enforcement. If you 
received this e-mail in error, please reply to sender and destroy or delete the 
message and any attachments. Thank you.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to