On Sat, 30 Nov 2013 21:53:06 +0000 "Blaicher, Christopher Y."
<[email protected]> wrote:

:>There are a number of things you need to do to prevent an integrity exposure. 
 At one point I saw a presentation by IBM on this, but right now I can't place 
my hands on it.  If I do find it, I will post it.  Here are the main points of 
it, as I remember them.

:>- Don't ever read data from a caller's address space when you are not in the 
caller's key.  As an SVC or PC your routine can be entered in key 
zero/supervisor state, I.E. you are a god and can do anything you want.

:>- Don't EVER, EVER write data to a caller's address space when you are not in 
the caller's key.

:>- You may have written the routine for your exclusive use, but don't 
assume/think/hope that no one else is going to find it.  Someone will and then 
they will try to exploit it or use it for nefarious purposes.

:>- TPROT data areas to be referenced.

If you do the above, the TPROT is superfluous. And if you do not, realize that
unless appropriately locked,  the results may no longer be valid when you try
to use it.  

--
Binyamin Dissen <[email protected]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to