There is a lot of security out there, if you're permitted to use it.  TCPIP did 
not make the mainframe less safe, other things using TCPIP did, especially when 
we moved most authentication off the mainframe.

"Let the servers do anything they want!"   "Ahhhh, no."

The pen tester found stupid pointless stuff, and left.  The one time they were 
successful, they found a list of privileged accounts off mainframe, and guessed 
at the four obvious per 90 day passwords based on a partial password of one of 
those ids, where the signon was not secure.

Things are only as secure as the weakest link.


-----Original Message-----
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On Behalf Of 
Seymour J Metz
Sent: Wednesday, May 08, 2019 2:57 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

It's similar to an authorized program in that there are complex rules for its 
use. You can associate access rules with controlled programs, but you need to 
dot all the Is and cross all the Ts.

An example might be giving a specific user to a payroll file only if he is 
running a specific program.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3

________________________________________
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf of Bob 
Bridges <robhbrid...@gmail.com>
Sent: Tuesday, May 7, 2019 5:46 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Yeah, about that:  What ~is~ a "controled program"?  I noticed that 
qualification, but my background is apps development and I'm woefully ignorant 
in spots.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Expecting the world to treat you fairly because you are a good person is a 
little like expecting the bull not to attack you because you are a vegetarian.  
-Dennis Wholey */


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Seymour J Metz
Sent: Tuesday, May 7, 2019 17:05

The quoted text refers to controlled programs, which are not what users 
normally run.

________________________________________
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf of Bob 
Bridges <robhbrid...@gmail.com>
Sent: Tuesday, May 7, 2019 5:02 PM

Well, more correctly, an installation ~can~ control users' ability to create 
dumps.  Here's a bit from the RACF manual:

"Your installation can control the dumping (with SYSUDUMP, SYSABEND, and 
SYSMDUMP statements) of address spaces that contain controlled programs by 
defining a profile to protect a resource called IEAABD.DMPAUTH in the FACILITY 
general resource class. / To control the dumping (with SYSABEND, SYSMDUMP, and 
SYSUDUMP statements) of address spaces that have tasks running in a task 
control block (TCB) key of less than 8, a profile protecting a resource called 
IEAABD.DMPAKEY must be defined in the FACILITY general resource class."

>From the way this is worded, I gather that if you don't define that rule in 
>RACF then dumps aren't restricted.  ACF2 and Top Secret may have the 
>restriction turned on by default, I'm not sure.  My current three clients seem 
>all to have this feature turned on, that is, they're controling access to 
>dumps.

-----Original Message-----
From: Seymour J Metz
Sent: Tuesday, May 7, 2019 16:29

"MVS users nowadays need special authority to create a program dump"?

-----Original Message-----
From: Bob Bridges <robhbrid...@gmail.com>
Sent: Tuesday, May 7, 2019 3:33 PM

And thus what I said last night:  MVS has been around longer, so it's had more 
opportunity to find and plug holes.  Give it another two decades and we may 
find that even Windows is much more secure.

Not perfect, of course, even then.  Iron sharpens iron, so the Good Guys and 
the Bad Guys continue to get smarter together.

In 1978 and '79 I worked for a university that had a DECsystem-10.  I learned a 
~ton~ back then about...well, I didn't think of it as hacking, but I could 
start a program, then <Ctrl-C> it and inspect the machine code at my leisure.  
I made substantial progress toward figuring out Colossal Cave's "magic mode" 
before I left there for another job.  It's primarily by remembering those days 
that I came to understand why MVS users nowadays need special authority to 
create a program dump.

-----Original Message-----
From: Seymour J Metz
Sent: Tuesday, May 7, 2019 13:21

While the old mainframes were too expensive for individual users, that changed 
by the 1960s and moreso by the 1970s. Reme4mber the Honeywell Kitchen Computer? 
The DEC PDP-5 and PDP-8?

As for mainframe security I don't believe that such operating systems as 
IBSYS/IBJOB cleared storage between jobs.

-----Original Message-----
From: Jesse 1 Robinson <jesse1.robin...@sce.com>
Sent: Tuesday, May 7, 2019 1:12 PM

When I explain mainframe security to the unwashed but curious, I cite history 
above all. The mainframe emerged from the primordial bit bucket soup at a time 
and in a form that utterly precluded individual users from possessing their own 
computers. The notion of one-computer-one-user was monstrously unthinkable. 
Mainframe was of necessity a shared environment in which utter strangers were 
obligated to breathe the same digital air and excrete into the same pools. 
Preventing cross contamination was the first commandment. This overriding 
concern guided and often dictated decades of evolution. There was never a 
moment in the mainframe's lineage where security or integrity could be 
architecturally compromised for *any* other goal.

Contrast that with any sort of Pee-Cee, where Pee stood originally for 'be sure 
to close the dorm room door when you toddle down the hall for a cold one'. 
Likewise for the U of xNIX. Each machine had one devoted owner whose needs were 
paramount. Unfortunately the computer could not discern its master by nose, a 
simple trick any dog could perform instinctively.

Then the throwable machines, by virtue of price and availability, were ushered 
on to the big-boy stage, and shareability was suddenly de rigueur.
So began still-developing Rube Goldberg mechanisms to keep multiple users out 
of each other's shorts. After decades of flailing around, the only 'security 
tool' trusted by weenie-ware folks with something important to protect is 
server isolation. Let's be clear. The major reason for the mind-boggling 
proliferation of midrange servers is not the need for more MIPS and gigabytes. 
It's the fundamental distrust common to all non-mainframe users that anyone 
else allowed onto MY hardware is a potential mugger. One app, one server. You 
got a problem with that? The boss will buy you your own server.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
DISCLAIMER: This email and any attachments may contain confidential information 
that is intended solely for use by the intended recipient(s). If you are not 
the intended recipient, you are strictly prohibited from disclosing, copying, 
distributing or using any of the information contained in the communication. If 
you received this email in error, please contact the sender by reply email and 
immediately delete the communication.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to