All,

I think we all agree that every system has vulnerabilities, where Windows, 
Unix,VM, or Z/OS,
the methods make it difficult for hackers to get into the systems, ,no 
different than protecting a home from robbers. By using a big dog and a 12 
gauge ..or electronic security system..many of us firewalls,routers,RACF,acf2, 
TSS, pass-phrases, encryption to slow down the intruder.

Sent from my iPad
Scott Ford
Senior Systems Engineer
www.identityforge.com



On Mar 27, 2012, at 2:49 PM, David Cole <[email protected]> wrote:

> I'm sorry Tom. I did not intend my remarks to be personal. I deeply regret 
> that you feel hurt by them. Please don't let my words deter you from future 
> contributions. Your thoughts generally are more valuable than most.
> 
> I just wanted to emphasize the APF Trojan horse vulnerability. It is real, it 
> is serious, yet for decades everyone seems to want to pretend that it does 
> not exist... It mystifies me.
> 
> 
> 
> 
> 
> 
>> www.zassure.com is the closest thing I've seen to an MVS anti-virus program. 
>>  After seeing a demo, I would have bought it, or recommended it to a client. 
>>  Check it out, you will be surprised, if not shocked.
> 
> Thank you for this. I will check it out.
> 
> 
> 
> 
> 
> 
>> [Regarding SAF] I do take issue with your last sentence.  SAF and an ESM 
>> have everything to do with anti-virus protection, provided they are 
>> configured to correctly protect APF-authorized resources.
> 
> Perhaps. However, all an APF authorized program has to do is flip a bit or 
> two in certain RACF control blocks, and voilĂ ! He's suddenly a supervisory 
> program and, as such, is given a pass on all RACF calls... Alternatively, a 
> malicious APF program can simply dynamically front-end certain supervisory 
> programs, and again voilĂ ! (As I'm sure you know, APF programs can fairly 
> easily defeat all hardware storage protections.)
> 
> Yes, SAF is still called even for APF programs, but an APF program can still 
> subvert those calls.
> 
> 
> 
> 
> 
> 
>> I've never forgotten this [APF libraries]. That's why my APF-authorized 
>> libraries are severely limited in scope, and audited for any and all updates.
> 
> Enforcing trust is a technical issue. RACF is very good at that. Deciding who 
> to trust is a management issue. Even at shops that allow only trusted vendor 
> software into APF authorized libraries is implicitly trusting the hundreds or 
> even thousands of people involved in the development of that software.
> 
> Again, I go into more detail about this in my prior post: 
> "<https://bama.ua.edu/cgi-bin/wa?A2=ind0608&L=IBM-MAIN&P=R63457&I=-3&X=6EB01556E36E4D9CAC&Y=dbcole%40colesoft.com&d=No+Match%3BMatch%3BMatches>https://bama.ua.edu/cgi-bin/wa?A2=ind0608&L=IBM-MAIN&P=R63457&I=-3&X=6EB01556E36E4D9CAC&Y=dbcole%40colesoft.com&d=No+Match%3BMatch%3BMatches
>  ".
> 
> 
> 
> 
> 
> 
> Again, please accept my apology, Tom. It was not intended to be personal. I'm 
> sorry it came out that way.
> 
> Dave Cole              REPLY TO: [email protected]
> ColeSoft Marketing     WEB PAGE: http://www.colesoft.com
> 736 Fox Hollow Road    VOICE:    540-456-8536
> Afton, VA 22920        FAX:      540-456-6658
> 
> 
> 
> 
> 
> 
> At 3/27/2012 02:21 PM, Pinnacle wrote:
>> Replies like this are why I seldom post to IBM-Main anymore.  The fact that 
>> it comes from someone who I respect and consider a friend hurts all the 
>> more.  Bottom line is that I work for a living, and I often don't have time 
>> to respond in gory detail to everything posted.  My primary objective here 
>> was to stress that the z/OS architecture is inherently hardened against 
>> viruses.  The fact that I did not go into explicit protections for 
>> APF-authorized programs appears to have been my fatal flaw, according to Mr. 
>> Cole.  Regardless of what comes back, this will be my last post on the 
>> subject.  My comments below.
>> 
>> Regards,
>> Tom Conley
>> 
>> 
>> 
>> 
>> On 3/27/2012 1:06 PM, David Cole wrote:
>>> At 3/27/2012 11:19 AM, Pinnacle wrote:
>>>> There is a mainframe product that protects against malicious software. 
>>>> It's called SAF, and it interfaces with ESM's like RACF, or ACF2, or 
>>>> TopSecret.
>>> 
>>> "SAF" is not a product. It stands for "System Access Facility" and it is 
>>> nothing more than an interface within z/OS into which a security system 
>>> (such as ACF2, TopSecret and any ryo security system) can plug into to 
>>> receive and respond to security calls. It really has nothing to do with 
>>> anti-virus protection.
>> 
>> SAF is not a product, you're right.  Please forgive my use of the term 
>> "product", I should have said "feature".  I do take issue with your last 
>> sentence.  SAF and an ESM have everything to do with anti-virus protection, 
>> provided they are configured to correctly protect APF-authorized resources.
>> 
>>>> It [z/OS] is the only operating system out there with built-in anti-virus 
>>>> protection. On top of that, the hardware itself actively protects against 
>>>> damage through storage keys, protected memory, etc.
>>>> You have to explain to the auditors that anti-virus software is not needed 
>>>> on z/OS, because it's intrinsic to the operating system and the hardware.
>>> 
>>> I think you seriously misunderstand what a virus is...
>>> 
>>> Yes, z/OS has exceptional security (and integrity and reliability) features 
>>> for protecting against non-authorized programs. But I must emphasize... 
>>> -->NON<--authorized programs!
>>> 
>>> When it comes to AUTHORIZED programs, z/OS's integrity (which is what you 
>>> are talking about with "storage keys" and such) is very good, but of course 
>>> not bulletproof. Worse though, when it comes to SECURITY, there are some 
>>> real problems! Because with the proper knowledge, it is TRIVIALLY EASY FOR 
>>> AN AUTHORIZED PROGRAM TO SUBVERT SECURITY COMPLETELY!
>>> 
>>> This is what mainframers constantly forget regarding security. For 
>>> authorized programs there is no security. All that is necessary for a 
>>> malicious program to do is to Trojan-horse its way (with the AC(1) 
>>> attribute) into an authorized library, and you're done for!
>> 
>> I've never forgotten this.  That's why my APF-authorized libraries are 
>> severely limited in scope, and audited for any and all updates.
>> 
>>> 
>>> As far as I know there is no serious anti-virus program for mainframes. I 
>>> believe strongly that there needs to be one, but I don't know of one. And 
>>> at this stage of the mainframe culture, I would be seriously suspicious of 
>>> the efficacy of any program that claimed to be anti-virus. I don't think 
>>> that a serious mainframe anti-virus program can exist unless and until IBM 
>>> itself makes a commitment to support an effort to make the mainframe 
>>> anti-virus proof.
>>> 
>> 
>> www.zassure.com is the closest thing I've seen to an MVS anti-virus program. 
>>  After seeing a demo, I would have bought it, or recommended it to a client. 
>>  Check it out, you will be surprised, if not shocked.
>> 
>> ----------------------------------------------------------------------
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to [email protected] with the message: INFO IBM-MAIN
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to