First off, if the hypothetical malicious program that you are worried about is 
running authorized then all bets are off. APF is the skeleton key to all of the 
locks in the kingdom. Reading random name/token pairs is the least of the 
problems.

> How difficult is it to "guess" the name?

If the name the programmer has chosen is p@ssw0rd then pretty easy. If the 
chosen name is some quasi-random 64-bit number, then not so much. IOW, it's up 
to you how easy to guess.

Can you chase a control block chain and read all of the pairs? I am going to 
guess yes, so, a prudent programmer might put a pointer into the name/token 
pair and encrypt the data that the pointer pointed to. Not sure if encrypting 
the name buys anything, but perhaps I have not thought it through sufficiently.

Charles

On Sun, 8 Dec 2024 23:07:22 +0000, Richard Zierdt 
<richard.zie...@freschesolutions.com> wrote:

>Name/Token pairs are pretty useful, but how secure are they?
>
>If created on a system level (IEANTCR, IEANT_SYSTEM_LEVEL) could any address 
>space access the pair if the name was known?  I presume yes.  How difficult is 
>it to "guess" the name?
>
>Is there a control block chain of name/token pairs that any (authorized / 
>unauthorized) program can "read" to see every name/token in the system, 
>regardless of level, or just those pairs created with system level ?
>
>If no, and the pairs are safely hidden away and/or encrypted, then fine.
>If yes, then it's an open book, and care might be taken before putting 
>sensitive data in the token.
>
>However, even if these pairs are an open book, the token could be encrypted by 
>the creator.  Same with the name.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to