We just got it configured and tested with my standard throwaway ShopZ order, 
Device Support Facilities. It works great, I'm sure management will love it.

Questions:

1) Is there anything on the radar to have SMP/e enforce package signature 
validation if the package is signed?
2) Ditto to have the ability for SMP/e not receive unsigned packages/products?

Using GIM facility classes to manage it would work for me.

Mark Jacobs 

Sent from ProtonMail, Swiss-based encrypted email.

GPG Public Key - 
https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com


------- Original Message -------
On Tuesday, May 16th, 2023 at 4:30 PM, Charles Mills <charl...@mcn.org> wrote:


> > If the signature is stored alongside the GIMZIP they could simply alter 
> > both.
> 
> 
> Yep, they could, but they would have about a one in a zillion chance of doing 
> so successfully. You would need the private key of the signer to get it 
> right. The digital signature is a hash of the software, encrypted with the 
> signer's private key. The hash algorithms are such that it is nearly 
> impossible to change the software but keep the same hash, and with a 
> different hash you need to have that private key to be able to make a 
> signature that will decrypt with the relevant well-known public key.
> 
> > which you trust more, DigiCert or your RACF
> 
> 
> The trustworthiness of CAs is one of the weakest parts of PKI and TLS. 
> Nothing against DigiCert -- they are fine folks, and I am sure have a robust 
> security program -- but CA's have been hacked with malicious effect.
> 
> https://en.wikipedia.org/wiki/DigiNotar#Issuance_of_fraudulent_certificates
> 
> Charles
> 
> On Tue, 16 May 2023 13:31:39 -0500, Paul Gilmartin paulgboul...@aol.com wrote:
> 
> > On Tue, 16 May 2023 13:04:44 -0500, Charles Mills wrote:
> > 
> > > Correct me if I am wrong, but my impression is that signing the package 
> > > protects (among other things) against the scenario in which one of your 
> > > associates, who let us assume is a bad guy, makes a zap-type modification 
> > > to the package after you download it and before you install it, thereby 
> > > compromising the integrity of your z/OS. Obviously, security for the 
> > > download will not protect against that, but package signing will.
> > 
> > OK. Verifying the signature at the point of RECEIVE FROMNTS protects against
> > (fe)malefactors' compromising the GIMZIP between download and RECEIVE.
> > If the signature is stored alongside the GIMZIP they could simply alter 
> > both.
> > 
> > And the SMPPTS must be protected until APPLY/ACCEPT, and the Target and
> > DLIBs indefinitely.
> > 
> > Some of this depends on which you trust more, DigiCert or your RACF 
> > configuration.
> > SMPNTS is a zFS hierarchy. How vulnerable is that?
> > 
> > --
> > gil
> > 
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to