Some clarifications:
1. Radek. Call me Radek. :-)   Radosław is official form and hard to pronounce by Englishmen. ;-)

2. I don't have a problem. I just want to *understand* it. Now it seems to me it is not rational, it is rather inheritance of very old days and very different, long time ago forgotten setup. However instead of impression I'd like to know the facts. That's all.

Regards
--
Radoslaw Skorupka
Lodz, Poland




W dniu 05.07.2025 o 21:30, Lennie Bradshaw pisze:
Bill,

I was not suggesting that zPDT is anything other than what it is. I was merely 
stating what exists. There is no possibility of a TKE for a zPDT but I am 
nevertheless glad to be able to change some Access Control Points for testing 
purposes.

Radoslaw wishes to alter some of the Access Control Points on his real system 
but has no TKE.

Nothing I have said was intended as any criticism of zPDT policy, nor was I 
stating that security on a zPDT is anything special. Basically, it is a Linux 
system and relies on Linux security for almost everything.

Lennie

-----Original Message-----
From: IBM Mainframe Discussion List<[email protected]> On Behalf 
[email protected]
Sent: 05 July 2025 16:38
To:[email protected]
Subject: Re: ICSF ACP and TKE

I run a zPDT and on there is a utility (i.e. a Linux command ACPTOOL) to allow 
the changing of some Control Points without a TKE.....
As has been stated multiple times in the zPDT documentation (RedBooks and 
BlueBook) and on the zPDT forum: zPDT is not intended as a secure system for 
many reasons. There are no plans to change this on an emulated system!!

There is an intent to have most of the ICSF commands/macros (and actual hardware instructions) 
"work" to provide program development and testing, but that is a different intent than 
providing a "real" secure system.  (And one specific recommendation has been repeated: DO 
NOT USE THE SAME MASTER KEYS ON zPDT THAT ARE USED ON A REAL SYSTEM.)

It seems to me (being old and a little stupid) that there are several levels to 
this discussion:

   1.
Those having almost no interest in security much beyond simple userids and some basic 
dataset protections. Many zPDT users, or perhaps real system/LPAR users who are 
sufficiently isolated by other means are in this group. This might include a potentially 
larger group of "newcomers" to mainframes!!
   2.
Those who would like to go through the motions (without digging too far into the details) 
to implement some basic security, mostly to protect against "accidental" 
errors/problems/trials/experimentation/etc. This level would probably involve some 
routine basic/simple maintenance such as normal RACF commands, etc, etc, etc.
   3.
Those who really need much fuller security and are willing to dig into many 
details. These might be installations that process $$billions$$ daily, etc, 
etc, etc, and need to immediately consider quantum-safe details, etc, etc. Or 
those who are developing software products to work in this environment.
   4.
Those dealing with other security natures (such as national Top Secret, etc, 
etc) and need to incorporate their systems into the appropriate 
level/compartment/etc.  (The IBM-MAIN discussions do not generally involve such 
systems, so I will ignore them here!)

In the good-old-days, when I was a little younger, there were often smaller RedBooks that dealt 
with practical usage of various areas of IBM systems. In a sense, this material was mostly written 
by actual users (customers, IBMers) of the products being addressed and often touched multiple IBM 
products/commands/components that were involved in practical operations. These were sometimes seen 
as "hands on" books. (Of course, since today few companies provide real "paper" 
books, there are additional considerations .....)

My $.02 worth, if it is worth that much!

Bill Ogden



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to