CBR3006I LIB ID not recognised

2019-05-06 Thread Peter
Hi

I have been receiving this error in one of our DR site.

I can see the LIB ID and PORT ID are part of IODF. I even tried deleting
LIB ID dynamically and reloaded the same IODF.

Device for 3590 have got all the attributes set  correctly same as
production.

I am not able to even vary on the the LIBRARY defined for 3592.

Under ISMF, tape list the port ID and LIB has been added and I can compare
it . There is no discrepancy between IODF entry and ISMF.

There was a discussion on this list long back. Not sure if the OP responded
how he resolved the issue.

Any pointers would be appreciated.

Peter

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CBR3006I LIB ID not recognised

2019-05-06 Thread Vernooij, Kees (ITOP NM) - KLM
The LIB ID must also be set in the library itself. Is that also the same ID?

Kees.

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Peter
> Sent: 06 May, 2019 11:44
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: CBR3006I LIB ID not recognised
> 
> Hi
> 
> I have been receiving this error in one of our DR site.
> 
> I can see the LIB ID and PORT ID are part of IODF. I even tried deleting
> LIB ID dynamically and reloaded the same IODF.
> 
> Device for 3590 have got all the attributes set  correctly same as
> production.
> 
> I am not able to even vary on the the LIBRARY defined for 3592.
> 
> Under ISMF, tape list the port ID and LIB has been added and I can compare
> it . There is no discrepancy between IODF entry and ISMF.
> 
> There was a discussion on this list long back. Not sure if the OP
> responded
> how he resolved the issue.
> 
> Any pointers would be appreciated.
> 
> Peter
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message.

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CBR3006I LIB ID not recognised

2019-05-06 Thread John McKown
On Mon, May 6, 2019 at 4:44 AM Peter  wrote:

> Hi
>
> I have been receiving this error in one of our DR site.
>
> I can see the LIB ID and PORT ID are part of IODF. I even tried deleting
> LIB ID dynamically and reloaded the same IODF.
>
> Device for 3590 have got all the attributes set  correctly same as
> production.
>
> I am not able to even vary on the the LIBRARY defined for 3592.
>
> Under ISMF, tape list the port ID and LIB has been added and I can compare
> it . There is no discrepancy between IODF entry and ISMF.
>
> There was a discussion on this list long back. Not sure if the OP responded
> how he resolved the issue.
>
> Any pointers would be appreciated.
>
> Peter
>
>
Do you see messages like this in the SYSLOG?

 CBR3006I Library $ATL0002 with Library ID A0420 unknown in I/O
 configuration.
*CBR3002E Library $ATL0002 no longer usable.
 CBR3006I Library $VTS0002 with Library ID B1589 unknown in I/O
 configuration.
*CBR3002E Library $VTS0002 no longer usable.


If so, that means that the Library IDs in the IODF / SMS do not match the
physical Library IDs at DR. You need to change the IODF and SMS to have the
proper physical Library IDs. This is one area which z/VM cannot virtualize.
If you don't know the actual Library IDs, the simplest way to get it is to
enter a command like I did below. Note that 0600 is a virtual tape address,
and 0800 is an ATL address.

V 0600,ONLINE
IEE103I UNIT 0600 NOT BROUGHT ONLINE 635
IEE763I NAME= IECTDSR2 CODE= 0008
IEA437I TAPE LIBRARY DEVICE(0600), HCD(B1589-01),DEVICE(70868-01)
IEE764I END OF IEE103IRELATED MESSAGES

V 808,ONLINE
IEE103I UNIT 0808 NOT BROUGHT ONLINE 578
IEE763I NAME= IECTDSR2 CODE= 0008
IEA437I TAPE LIBRARY DEVICE(0808), HCD(A0420-01),DEVICE(17909-02)
IEE764I END OF IEE103IRELATED MESSAGES


The above shows that my HCD has B1589-01, but the physical device has
70868. So I went into the HCD and changed the Library ID for the devices. I
also updated SMS for the VTS definition. I had to do the same with the
physical ATL devices. I could then do a soft activate of the new IODF and
an ACTIVATE of the new (updated) SCDS as well.


-- 
This is clearly another case of too many mad scientists, and not enough
hunchbacks.


Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Chad Rikansrud
The only ones I know of that have been published are the ones that were 
mentioned (There were legitimate mainframe vulns in there, not just creds 
reused).  I know of others that are actual hacks, but none that are public 
information.

Chad

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread Allan Staller
The actual arch level should be somewhere in the Job listing from the Cobol 
Compile.

HTH,

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
John Abell
Sent: Saturday, May 4, 2019 9:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

I am a bit behind on this issue so maybe you have tried some of the below.

I am puzzled by this unless the ARCH parm is not taken by the compiler for some 
reason.  Do you have the same problem using the DEFAULT ARCH value?

Generate the assembler listing and then see if the S0C1 or S0C4 actually 
happens in the COBOL code.  Also check the ARCH value in the listing.  Look for 
Vector instructions, in the assembler listing for starters. I did this for the 
C modules compiled under z/OS 2.3 and ARCH(12) and the new Vector instructions 
were in the listing.  They were not there using earlier versions of the 
compiler.  I generate C code all of the time using the ARCH and TUNEs value for 
the client's machine.  The code is compiled on a z14.  Client's with z12s and 
z13s report no issues.  This is all using LE.

One item of interest, maybe, is that the C code compiled with ARCH(12) on z/OS 
2.3 runs without issue on z/OS 2.2 and 2.2's LE on a z14.

Can you run without the 3rd party software and see if your code runs?

John T. Abell
Tel:800-295-7608Option 4
President
International:  1-416-593-5578  Option 4
E-mail:  john.ab...@intnlsoftwareproducts.com
Fax:800-295-7609

International:  1-416-593-5579


International Software Products
https://apc01.safelinks.protection.outlook.com/?url=www.ispinfo.com&data=02%7C01%7Callan.staller%40HCL.COM%7C94623be694344a0455d808d6d09f07a0%7C189de737c93a4f5a8b686f4ca9941912%7C0%7C0%7C636925778808536522&sdata=hIdc5QKlumv6gBEJu8VMRPH7iXIE42%2BgqvIYR5yhpZY%3D&reserved=0

This email may contain confidential and privileged material for the sole use of 
the intended recipient(s). Any review, use, retention, distribution or 
disclosure by others is strictly prohibited. If you are not the intended 
recipient (or authorized to receive on behalf of the named recipient), please 
contact the sender by reply email and delete all copies of this message. 
Also,email is susceptible to data corruption, interception, tampering, 
unauthorized amendment and viruses. We only send and receive emails on the 
basis that we are not liable for any such corruption, interception, tampering, 
amendment or viruses or any consequence thereof.


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Mike Schwab
Sent: Friday, May 03, 2019 8:41 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

Is the abend in the user compiled instructions?  Then check the compiler 
processor settings.

Is the abend in the vendor compiled libraries or included subroutines?
 Then check the vendor's subroutine / runtime libraries.

On Fri, May 3, 2019 at 6:52 PM Charles Mills  wrote:
>
> I think I disagree.
>
> You compile the program for ARCH(8). IBM guarantees that it will run on a z10 
> (do I have that right?). They do NOT guarantee that the program plus LE will 
> behave on a z114 exactly as though it were running on a z10.
>
> No matter what ARCH the program were compiled for, I would expect that LE 
> running on a z114 might well exploit the actual hardware. I would be kind of 
> unhappy if it did NOT.
>
> The vendor product either supports z114's or it does not. If they do not 
> support z114 instructions, they should admit that they do not.
>
> > If LE really is doing this, why even have an ABO product
>
> To update ("optimize") the *compiled* object code. The OS-resident 
> support/library modules (LE) are a different matter. They are already (I am 
> guessing) at a current level.
>
> What is the z/OS release? I would expect LE to be built for the lowest level 
> hardware that that release supported, but LE might be clever enough to 
> dual-path, and I think that would be a good thing.
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Mark Zelden
> Sent: Friday, May 3, 2019 3:35 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: COBOL 6.2 and ARCH(12)
>
> On Fri, 3 May 2019 15:57:34 -0400, Brian Chapman  wrote:
>
> >We have a vendor debugging product that is constantly causing 0C1 and
> >0C4 abends since we have upgraded to COBOL 6.2. It also caused these
> >abends when we were at COBOL 4,2, but the abend rate has grown
> >considerably after the upgrade.
> >
> >The vendor has produced countless patches, but so far they have not
> >resolved the issues. We were notified today that they believe they
> >understand the issue. They are stating that even though our COBOL
> >compiler is set with ARCH(8) (to support our DRE machine), LE
> >run-time is recognizing that the program is COBOL 6.2, running on a
> >z14, and automatically switch the ARCH level to ARCH(12). The

Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread John Abell
Your should have something similar to the following in the COBOL listing where 
I have used ARCH(11).

Invocation parameters:
 OPTFILE  
Options from SYSOPTF: 
 ARCH(11) 
 ARITH(COMPAT)
 DATA(31) 
.
.
. 

John T. Abell   
Tel:800-295-7608Option 4
President 
International:  1-416-593-5578  Option 4
E-mail:  john.ab...@intnlsoftwareproducts.com
Fax:800-295-7609

International:  1-416-593-5579


International Software Products
www.ispinfo.com


This email may contain confidential and privileged material for the sole use of 
the intended recipient(s). Any review, use, retention, distribution or 
disclosure by others is strictly prohibited. If you are not the intended 
recipient (or authorized to receive on behalf of the named recipient), please 
contact the sender by reply email and delete all copies of this message. 
Also,email is susceptible to data corruption, interception, 
tampering, unauthorized amendment and viruses. We only send and receive emails 
on the basis that we are not liable for any such corruption, interception, 
tampering, amendment or viruses or any consequence thereof.


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Allan Staller
Sent: Monday, May 06, 2019 8:35 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

The actual arch level should be somewhere in the Job listing from the Cobol 
Compile.

HTH,

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
John Abell
Sent: Saturday, May 4, 2019 9:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

I am a bit behind on this issue so maybe you have tried some of the below.

I am puzzled by this unless the ARCH parm is not taken by the compiler for some 
reason.  Do you have the same problem using the DEFAULT ARCH value?

Generate the assembler listing and then see if the S0C1 or S0C4 actually 
happens in the COBOL code.  Also check the ARCH value in the listing.  Look for 
Vector instructions, in the assembler listing for starters. I did this for the 
C modules compiled under z/OS 2.3 and ARCH(12) and the new Vector instructions 
were in the listing.  They were not there using earlier versions of the 
compiler.  I generate C code all of the time using the ARCH and TUNEs value for 
the client's machine.  The code is compiled on a z14.  Client's with z12s and 
z13s report no issues.  This is all using LE.

One item of interest, maybe, is that the C code compiled with ARCH(12) on z/OS 
2.3 runs without issue on z/OS 2.2 and 2.2's LE on a z14.

Can you run without the 3rd party software and see if your code runs?

John T. Abell
Tel:800-295-7608Option 4
President
International:  1-416-593-5578  Option 4
E-mail:  john.ab...@intnlsoftwareproducts.com
Fax:800-295-7609

International:  1-416-593-5579


International Software Products
https://apc01.safelinks.protection.outlook.com/?url=www.ispinfo.com&data=02%7C01%7Callan.staller%40HCL.COM%7C94623be694344a0455d808d6d09f07a0%7C189de737c93a4f5a8b686f4ca9941912%7C0%7C0%7C636925778808536522&sdata=hIdc5QKlumv6gBEJu8VMRPH7iXIE42%2BgqvIYR5yhpZY%3D&reserved=0

This email may contain confidential and privileged material for the sole use of 
the intended recipient(s). Any review, use, retention, distribution or 
disclosure by others is strictly prohibited. If you are not the intended 
recipient (or authorized to receive on behalf of the named recipient), please 
contact the sender by reply email and delete all copies of this message. 
Also,email is susceptible to data corruption, interception, tampering, 
unauthorized amendment and viruses. We only send and receive emails on the 
basis that we are not liable for any such corruption, interception, tampering, 
amendment or viruses or any consequence thereof.


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Mike Schwab
Sent: Friday, May 03, 2019 8:41 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

Is the abend in the user compiled instructions?  Then check the compiler 
processor settings.

Is the abend in the vendor compiled libraries or included subroutines?
 Then check the vendor's subroutine / runtime libraries.

On Fri, May 3, 2019 at 6:52 PM Charles Mills  wrote:
>
> I think I disagree.
>
> You compile the program for ARCH(8). IBM guarantees that it will run on a z10 
> (do I have that right?). They do NOT guarantee that the program plus LE will 
> behave on a z114 exactly as though it were r

Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread Brian Chapman
I verified a few of my recent COBOL listings, and they all have ARCH(8)
specified.

Our applications developers claim that this issue only occurs when they run
their code through the debugger. It apparently never occurs outside the
debugger. The issue has been very intermittent, so it hasn't been easy to
replicate but we have dumps from most of the 0C1 or 0C4 abends.

How does z/OS handle a situation where two COBOL programs that are compiled
at different ARCH levels and part of the same LE enclave? Since the vendor
code receives execution first, does it determine the enclave level? I'm not
sure what ARCH level the vendor compiles their COBOL code (if they have
any).


Thank you,

Brian Chapman


On Mon, May 6, 2019 at 9:01 AM John Abell <
john.ab...@intnlsoftwareproducts.com> wrote:

> Your should have something similar to the following in the COBOL listing
> where I have used ARCH(11).
>
> Invocation parameters:
>  OPTFILE
> Options from SYSOPTF:
>  ARCH(11)
>  ARITH(COMPAT)
>  DATA(31)
> .
> .
> .
>
> John T. Abell
> Tel:800-295-7608Option 4
> President
> International:  1-416-593-5578  Option 4
> E-mail:  john.ab...@intnlsoftwareproducts.com
> Fax:800-295-7609
>
> International:  1-416-593-5579
>
>
> International Software Products
> www.ispinfo.com
>
> This email may contain confidential and privileged material for the sole
> use of the intended recipient(s). Any review, use, retention, distribution
> or disclosure by others is strictly prohibited. If you are not the intended
> recipient (or authorized to receive on behalf of the named recipient),
> please contact the sender by reply email and delete all copies of this
> message. Also,email is susceptible to data corruption, interception,
> tampering, unauthorized amendment and viruses. We only send and receive
> emails on the basis that we are not liable for any such corruption,
> interception, tampering, amendment or viruses or any consequence thereof.
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Allan Staller
> Sent: Monday, May 06, 2019 8:35 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: COBOL 6.2 and ARCH(12)
>
> The actual arch level should be somewhere in the Job listing from the
> Cobol Compile.
>
> HTH,
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of John Abell
> Sent: Saturday, May 4, 2019 9:44 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: COBOL 6.2 and ARCH(12)
>
> I am a bit behind on this issue so maybe you have tried some of the below.
>
> I am puzzled by this unless the ARCH parm is not taken by the compiler for
> some reason.  Do you have the same problem using the DEFAULT ARCH value?
>
> Generate the assembler listing and then see if the S0C1 or S0C4 actually
> happens in the COBOL code.  Also check the ARCH value in the listing.  Look
> for Vector instructions, in the assembler listing for starters. I did this
> for the C modules compiled under z/OS 2.3 and ARCH(12) and the new Vector
> instructions were in the listing.  They were not there using earlier
> versions of the compiler.  I generate C code all of the time using the ARCH
> and TUNEs value for the client's machine.  The code is compiled on a z14.
> Client's with z12s and z13s report no issues.  This is all using LE.
>
> One item of interest, maybe, is that the C code compiled with ARCH(12) on
> z/OS 2.3 runs without issue on z/OS 2.2 and 2.2's LE on a z14.
>
> Can you run without the 3rd party software and see if your code runs?
>
> John T. Abell
> Tel:800-295-7608Option 4
> President
> International:  1-416-593-5578  Option 4
> E-mail:  john.ab...@intnlsoftwareproducts.com
> Fax:800-295-7609
>
> International:  1-416-593-5579
>
>
> International Software Products
>
> https://apc01.safelinks.protection.outlook.com/?url=www.ispinfo.com&data=02%7C01%7Callan.staller%40HCL.COM%7C94623be694344a0455d808d6d09f07a0%7C189de737c93a4f5a8b686f4ca9941912%7C0%7C0%7C636925778808536522&sdata=hIdc5QKlumv6gBEJu8VMRPH7iXIE42%2BgqvIYR5yhpZY%3D&reserved=0
>
> This email may contain confidential and privileged material for the sole
> use of the intended recipient(s). Any review, use, retention, distribution
> or disclosure by others is strictly prohibited. If you are not the intended
> recipient (or authorized to receive on behalf of the named recipient),
> please contact the sender by reply email and delete all copies of this
> message. Also,email is susceptible to data corruption, interception,
> tampering, unauthorized amendment and viruses. We only send and receive
> emails on the basis that we are not liable for any such corruption,
> interception, tampering, amendment or viruses or any consequence thereof.
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Mike Schwab
> Sent: Friday, May 03, 2019 8:41 PM
> To: IBM-MAIN@LISTSERV.U

Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread Charles Mills
> How does z/OS handle a situation where two COBOL programs that are compiled
> at different ARCH levels and part of the same LE enclave? Since the vendor
> code receives execution first, does it determine the enclave level?

I don't think an enclave HAS an ARCH level. ARCH is a compiler parm. If you 
were writing a compiler, your compiler code would say "can I use machine 
instruction XYZ? Nope, user said ARCH(n), so no can do." The code you emitted 
would be fixed (of course): it would never, ever have an instruction XYZ in it. 
If the user ran it on a zWhatever, it would still be devoid of XYZ 
instructions. The enclave does not have an ARCH level, the various programs 
running there either do or do not include instruction XYZ.

> I'm not
> sure what ARCH level the vendor compiles their COBOL code (if they have
> any).

They need to know. I was until very recently responsible for a vendor product 
written in C++. There was a conscious management decision to support customers 
back through a z9, so I compiled ARCH(7). End of story. I did not pick some new 
ARCH level that appealed to me that day.

Question: did you possibly customize or parametize the debugger for a z14 
during installation, and then clone that installation over to your older DR 
machine?

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Brian Chapman
Sent: Monday, May 6, 2019 6:13 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

I verified a few of my recent COBOL listings, and they all have ARCH(8)
specified.

Our applications developers claim that this issue only occurs when they run
their code through the debugger. It apparently never occurs outside the
debugger. The issue has been very intermittent, so it hasn't been easy to
replicate but we have dumps from most of the 0C1 or 0C4 abends.

How does z/OS handle a situation where two COBOL programs that are compiled
at different ARCH levels and part of the same LE enclave? Since the vendor
code receives execution first, does it determine the enclave level? I'm not
sure what ARCH level the vendor compiles their COBOL code (if they have
any).


Thank you,

Brian Chapman

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread Brian Chapman
Charles,

Thanks for the explanation. Our system IGYCOPT specifies ARCH=*8.

We are only experiencing this issue on our production machine. We clone our
machine for DR, but our test systems are never started so the debugging
tool would never be used on this machine. Simulation debuggers are not
allowed on our production systems.



Thank you,

Brian Chapman


On Mon, May 6, 2019 at 10:34 AM Charles Mills  wrote:

> > How does z/OS handle a situation where two COBOL programs that are
> compiled
> > at different ARCH levels and part of the same LE enclave? Since the
> vendor
> > code receives execution first, does it determine the enclave level?
>
> I don't think an enclave HAS an ARCH level. ARCH is a compiler parm. If
> you were writing a compiler, your compiler code would say "can I use
> machine instruction XYZ? Nope, user said ARCH(n), so no can do." The code
> you emitted would be fixed (of course): it would never, ever have an
> instruction XYZ in it. If the user ran it on a zWhatever, it would still be
> devoid of XYZ instructions. The enclave does not have an ARCH level, the
> various programs running there either do or do not include instruction XYZ.
>
> > I'm not
> > sure what ARCH level the vendor compiles their COBOL code (if they have
> > any).
>
> They need to know. I was until very recently responsible for a vendor
> product written in C++. There was a conscious management decision to
> support customers back through a z9, so I compiled ARCH(7). End of story. I
> did not pick some new ARCH level that appealed to me that day.
>
> Question: did you possibly customize or parametize the debugger for a z14
> during installation, and then clone that installation over to your older DR
> machine?
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Brian Chapman
> Sent: Monday, May 6, 2019 6:13 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: COBOL 6.2 and ARCH(12)
>
> I verified a few of my recent COBOL listings, and they all have ARCH(8)
> specified.
>
> Our applications developers claim that this issue only occurs when they run
> their code through the debugger. It apparently never occurs outside the
> debugger. The issue has been very intermittent, so it hasn't been easy to
> replicate but we have dumps from most of the 0C1 or 0C4 abends.
>
> How does z/OS handle a situation where two COBOL programs that are compiled
> at different ARCH levels and part of the same LE enclave? Since the vendor
> code receives execution first, does it determine the enclave level? I'm not
> sure what ARCH level the vendor compiles their COBOL code (if they have
> any).
>
>
> Thank you,
>
> Brian Chapman
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CBR3006I LIB ID not recognised

2019-05-06 Thread Peter
'Note that 0600 is a virtual tape address,
and 0800 is an ATL address'

Guess 0600 and 800 is specific to your shop ? In my shop I have the UCB set
as 2800 and 2801 for 3590.

I get the same error message when I vary on 2800 and 2801

How do the IBM hardware guys set the LIB ID in ATL ?( just curious I am
away from my DR site )

On Mon, 6 May, 2019, 3:48 PM John McKown, 
wrote:

> On Mon, May 6, 2019 at 4:44 AM Peter  wrote:
>
> > Hi
> >
> > I have been receiving this error in one of our DR site.
> >
> > I can see the LIB ID and PORT ID are part of IODF. I even tried deleting
> > LIB ID dynamically and reloaded the same IODF.
> >
> > Device for 3590 have got all the attributes set  correctly same as
> > production.
> >
> > I am not able to even vary on the the LIBRARY defined for 3592.
> >
> > Under ISMF, tape list the port ID and LIB has been added and I can
> compare
> > it . There is no discrepancy between IODF entry and ISMF.
> >
> > There was a discussion on this list long back. Not sure if the OP
> responded
> > how he resolved the issue.
> >
> > Any pointers would be appreciated.
> >
> > Peter
> >
> >
> Do you see messages like this in the SYSLOG?
>
>  CBR3006I Library $ATL0002 with Library ID A0420 unknown in I/O
>  configuration.
> *CBR3002E Library $ATL0002 no longer usable.
>  CBR3006I Library $VTS0002 with Library ID B1589 unknown in I/O
>  configuration.
> *CBR3002E Library $VTS0002 no longer usable.
>
>
> If so, that means that the Library IDs in the IODF / SMS do not match the
> physical Library IDs at DR. You need to change the IODF and SMS to have the
> proper physical Library IDs. This is one area which z/VM cannot virtualize.
> If you don't know the actual Library IDs, the simplest way to get it is to
> enter a command like I did below. Note that 0600 is a virtual tape address,
> and 0800 is an ATL address.
>
> V 0600,ONLINE
> IEE103I UNIT 0600 NOT BROUGHT ONLINE 635
> IEE763I NAME= IECTDSR2 CODE= 0008
> IEA437I TAPE LIBRARY DEVICE(0600), HCD(B1589-01),DEVICE(70868-01)
> IEE764I END OF IEE103IRELATED MESSAGES
>
> V 808,ONLINE
> IEE103I UNIT 0808 NOT BROUGHT ONLINE 578
> IEE763I NAME= IECTDSR2 CODE= 0008
> IEA437I TAPE LIBRARY DEVICE(0808), HCD(A0420-01),DEVICE(17909-02)
> IEE764I END OF IEE103IRELATED MESSAGES
>
>
> The above shows that my HCD has B1589-01, but the physical device has
> 70868. So I went into the HCD and changed the Library ID for the devices. I
> also updated SMS for the VTS definition. I had to do the same with the
> physical ATL devices. I could then do a soft activate of the new IODF and
> an ACTIVATE of the new (updated) SCDS as well.
>
>
> --
> This is clearly another case of too many mad scientists, and not enough
> hunchbacks.
>
>
> Maranatha! <><
> John McKown
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Crazy concatenation mystery

2019-05-06 Thread Seymour J Metz
Not that I know of, other then the SMF records for the input and output.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Paul Gilmartin <000433f07816-dmarc-requ...@listserv.ua.edu>
Sent: Friday, May 3, 2019 1:42 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Crazy concatenation mystery

On Fri, 3 May 2019 14:03:49 +, Seymour J Metz wrote:

>In OS/360, IEBCOPY couldn't reblock load modules. In OS/VS, it could, with the 
>appropriate control statement.
>
When IEBCOPY reblocks a module, does it leave any audit trail?  That
might be of interest in case of the OP's problem.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Crazy concatenation mystery

2019-05-06 Thread Seymour J Metz
By "object blocks" do you mean text blocks? As I recall, everything other than 
text blocks is limited to 256 bytes.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Mike Schwab 
Sent: Thursday, May 2, 2019 11:39 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Crazy concatenation mystery

The object code blocks are written in multiples of 1K up to 32,760
bytes.  There are also text blocks that are usually under 1K unless
you have a lot of external symbols. A linkedit / binder / copymod will
try to fill the rest of the track, down to a 1K block.  The Advance
Print Function libraries should be 18K.

On Thu, May 2, 2019 at 9:16 PM David Spiegel  wrote:
>
> Hi Steve,
> You said: "... but the received wisdom is that all load libraries should
> have blksize=32K-8. ..."
>
> For optimal space usage, however, the BLKSIZE should be 27998 (i.e. 
> half-track blocking).
>
> Regards,
> David
>
> On 2019-05-02 21:57, Steve Smith wrote:
> > Well, Greg Price explained why the blksize issue doesn't arise in normal
> > execution.
> >
> > In addition, PDSEs don't really have a blksize; that is faked up on the fly
> > when BPAM or something similar is used.  Program Fetch uses something like
> > DIV or paging I/O to load program objects.  For classic PDS, the blksize is
> > "real", but again Program Fetch doesn't use access methods, and doesn't
> > care what size the blocks are.
> >
> > It's a little late in the day, but the received wisdom is that all load
> > libraries should have blksize=32K-8.  That predates PDSE by decades.  The
> > old linkage-editor was smart enough to fill tracks up with whatever block
> > size would fit.  As long as it wasn't artificially restricted to something
> > less than the max.  RECFM=U does not work like FB.
> >
> > btw, why are you running FA?  Has it ever done anything useful for you?
> >
> > sas
> >
> >
> >
> > On Thu, May 2, 2019 at 8:42 PM Attila Fogarasi  wrote:
> >
> >> The Binder is not invoked by Db2 when executing your application program --
> >> hence no error message and successful execution.  Fault Analyzer is
> >> invoking the Binder to get debugging info about the load module as part of
> >> its processing for the prior problem.  Other debugging tools handle this
> >> more elegantly but FA chooses to just confuse you with the irrelevant
> >> cascaded error which has no bearing on the defect it is trying to report.
> >>   Quick fix is to turn off Fault Analyzer as these "invalid" load module
> >> block sizes are perfectly valid for execution or even for use with the
> >> Binder with the right environment.  For better or worse the Binder defaults
> >> to using 32760 (maximum device supported blksize) whenever possible, unless
> >> directed otherwise.
> >>
> >> On Fri, May 3, 2019 at 8:43 AM Jesse 1 Robinson 
> >> wrote:
> >>
> >>> Thanks to the many contributions to this thread, I think we have it
> >>> (mostly) figured out. The key was identifying what changed on 14 April.
> >> No
> >>> module changes. No JCL changes. But of course something happened that I
> >>> didn't mention earlier because 'it could not be the cause'. What happened
> >>> on the 14th was an error in the data that caused an SQL duplicate record
> >>> condition, or 811. That led to a U3003 abend, which woke up Fault
> >> Analyzer
> >>> *for the first time*. Upon awakening, he looked around and saw the
> >> invalid
> >>> module block sizes and complained about them. For literally years FA had
> >>> never peeped because there had never been an actual abend. Why did fetch
> >>> not bellyache about BLKSIZE? I have no idea. The module named in the
> >> message
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> > .
> >
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CBR3006I LIB ID not recognised

2019-05-06 Thread John McKown
On Mon, May 6, 2019 at 11:44 AM Peter  wrote:

> 'Note that 0600 is a virtual tape address,
> and 0800 is an ATL address'
>
> Guess 0600 and 800 is specific to your shop ? In my shop I have the UCB set
> as 2800 and 2801 for 3590.
>

Correct. I could have been clearer about that.



>
> I get the same error message when I vary on 2800 and 2801
>
> How do the IBM hardware guys set the LIB ID in ATL ?( just curious I am
> away from my DR site )
>

I have no idea. It may be settable in the firmware, or maybe it is "hard
coded" into the hardware. I am thinking that it is conceptually like the
CPUID on the z.

-- 
This is clearly another case of too many mad scientists, and not enough
hunchbacks.


Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread Charles Mills
I don't think this is an ARCH problem at all. I think the darned debugger is 
just plain buggy.

You say the debugger is experiencing S0C4's (as well as S0C1's). I don't think 
an ARCH mismatch can cause a S0C4 (at least not in the real world -- someone 
might be able to come up with a theoretical example). An ARCH problem would 
almost always result in a S0C1. Nor should an ARCH issue ever cause a problem 
on a newer machine (compile ARCH(8), run on z14) but only on an older machine 
(compile ARCH(12), attempt to run on z10).

Ergo, I do not think you have an ARCH problem, I think the debugger has a bug 
problem.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Brian Chapman
Sent: Monday, May 6, 2019 8:25 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

Charles,

Thanks for the explanation. Our system IGYCOPT specifies ARCH=*8.

We are only experiencing this issue on our production machine. We clone our
machine for DR, but our test systems are never started so the debugging
tool would never be used on this machine. Simulation debuggers are not
allowed on our production systems.



Thank you,

Brian Chapman


On Mon, May 6, 2019 at 10:34 AM Charles Mills  wrote:

> > How does z/OS handle a situation where two COBOL programs that are
> compiled
> > at different ARCH levels and part of the same LE enclave? Since the
> vendor
> > code receives execution first, does it determine the enclave level?
>
> I don't think an enclave HAS an ARCH level. ARCH is a compiler parm. If
> you were writing a compiler, your compiler code would say "can I use
> machine instruction XYZ? Nope, user said ARCH(n), so no can do." The code
> you emitted would be fixed (of course): it would never, ever have an
> instruction XYZ in it. If the user ran it on a zWhatever, it would still be
> devoid of XYZ instructions. The enclave does not have an ARCH level, the
> various programs running there either do or do not include instruction XYZ.
>
> > I'm not
> > sure what ARCH level the vendor compiles their COBOL code (if they have
> > any).
>
> They need to know. I was until very recently responsible for a vendor
> product written in C++. There was a conscious management decision to
> support customers back through a z9, so I compiled ARCH(7). End of story. I
> did not pick some new ARCH level that appealed to me that day.
>
> Question: did you possibly customize or parametize the debugger for a z14
> during installation, and then clone that installation over to your older DR
> machine?
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Brian Chapman
> Sent: Monday, May 6, 2019 6:13 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: COBOL 6.2 and ARCH(12)
>
> I verified a few of my recent COBOL listings, and they all have ARCH(8)
> specified.
>
> Our applications developers claim that this issue only occurs when they run
> their code through the debugger. It apparently never occurs outside the
> debugger. The issue has been very intermittent, so it hasn't been easy to
> replicate but we have dumps from most of the 0C1 or 0C4 abends.
>
> How does z/OS handle a situation where two COBOL programs that are compiled
> at different ARCH levels and part of the same LE enclave? Since the vendor
> code receives execution first, does it determine the enclave level? I'm not
> sure what ARCH level the vendor compiles their COBOL code (if they have
> any).
>
>
> Thank you,
>
> Brian Chapman
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Charles Mills
> One of the tricks he pulled was to offload the RACF Database to a PC and 
> Dictionary Attack it.

I *believe* that was done by investigators after the fact, attempting to 
determine how the attack might have been done. I don't recall that there is 
compelling evidence that Svartholm actually did that.

It *is* trivially easy to do, assuming (a.) read access to the DB and (b.) 
old-style password storage.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of David Spiegel
Sent: Sunday, May 5, 2019 8:02 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Hi Itschak,
Gottfrid Svartholm Warg   (Pirate Bay founder) hacked Logica.
One of the tricks he pulled was to offload the RACF Database to a PC and 
Dictionary Attack it.
The Security Admin folks were inexperienced to say the least.
(This is not to say that relatively secure site with seasoned veterans can't be 
hacked.
They just made it easy.)

Regards,
David

On 2019-05-05 10:35, ITschak Mugzach wrote:

I wonder if there are proved & published cases where mainframe where
hacked. I know the Danish case of GCG.

ITschak




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Charles Mills
#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
legitimate part of the mainframe, which it has been for 20 years or so). It was 
an exploit of CGI buffer overrun.

#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It 
wasn't really a mainframe hack, they got in through USS." "It wasn't really a 
mainframe hack, they re-used a Windows password." "It wasn't really a mainframe 
hack ... whatever." If your CEO was standing in front of the press explaining 
how your company let x million credit card numbers go astray, would it matter 
HOW they got into your mainframe, or only that they DID?" If your mainframe is 
vulnerable to a USS hack, or a shared Windows password, or whatever, you need 
to fix THAT, or risk having to explain to your CEO why he got fired (like 
Target's) for letting all those credit card numbers go astray.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Sunday, May 5, 2019 10:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
mainframe credentials.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL 6.2 and ARCH(12)

2019-05-06 Thread John Abell
I fully agree with this opinion.

John T. Abell   
Tel:800-295-7608Option 4
President 
International:  1-416-593-5578  Option 4
E-mail:  john.ab...@intnlsoftwareproducts.com
Fax:800-295-7609

International:  1-416-593-5579


International Software Products
www.ispinfo.com


This email may contain confidential and privileged material for the sole use of 
the intended recipient(s). Any review, use, retention, distribution or 
disclosure by others is strictly prohibited. If you are not the intended 
recipient (or authorized to receive on behalf of the named recipient), please 
contact the sender by reply email and delete all copies of this message. 
Also,email is susceptible to data corruption, interception, 
tampering, unauthorized amendment and viruses. We only send and receive emails 
on the basis that we are not liable for any such corruption, interception, 
tampering, amendment or viruses or any consequence thereof.


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Monday, May 06, 2019 1:08 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

I don't think this is an ARCH problem at all. I think the darned debugger is 
just plain buggy.

You say the debugger is experiencing S0C4's (as well as S0C1's). I don't think 
an ARCH mismatch can cause a S0C4 (at least not in the real world -- someone 
might be able to come up with a theoretical example). An ARCH problem would 
almost always result in a S0C1. Nor should an ARCH issue ever cause a problem 
on a newer machine (compile ARCH(8), run on z14) but only on an older machine 
(compile ARCH(12), attempt to run on z10).

Ergo, I do not think you have an ARCH problem, I think the debugger has a bug 
problem.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Brian Chapman
Sent: Monday, May 6, 2019 8:25 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL 6.2 and ARCH(12)

Charles,

Thanks for the explanation. Our system IGYCOPT specifies ARCH=*8.

We are only experiencing this issue on our production machine. We clone our 
machine for DR, but our test systems are never started so the debugging tool 
would never be used on this machine. Simulation debuggers are not allowed on 
our production systems.



Thank you,

Brian Chapman


On Mon, May 6, 2019 at 10:34 AM Charles Mills  wrote:

> > How does z/OS handle a situation where two COBOL programs that are
> compiled
> > at different ARCH levels and part of the same LE enclave? Since the
> vendor
> > code receives execution first, does it determine the enclave level?
>
> I don't think an enclave HAS an ARCH level. ARCH is a compiler parm. 
> If you were writing a compiler, your compiler code would say "can I 
> use machine instruction XYZ? Nope, user said ARCH(n), so no can do." 
> The code you emitted would be fixed (of course): it would never, ever 
> have an instruction XYZ in it. If the user ran it on a zWhatever, it 
> would still be devoid of XYZ instructions. The enclave does not have 
> an ARCH level, the various programs running there either do or do not include 
> instruction XYZ.
>
> > I'm not
> > sure what ARCH level the vendor compiles their COBOL code (if they 
> > have any).
>
> They need to know. I was until very recently responsible for a vendor 
> product written in C++. There was a conscious management decision to 
> support customers back through a z9, so I compiled ARCH(7). End of 
> story. I did not pick some new ARCH level that appealed to me that day.
>
> Question: did you possibly customize or parametize the debugger for a 
> z14 during installation, and then clone that installation over to your 
> older DR machine?
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
> On Behalf Of Brian Chapman
> Sent: Monday, May 6, 2019 6:13 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: COBOL 6.2 and ARCH(12)
>
> I verified a few of my recent COBOL listings, and they all have 
> ARCH(8) specified.
>
> Our applications developers claim that this issue only occurs when 
> they run their code through the debugger. It apparently never occurs 
> outside the debugger. The issue has been very intermittent, so it 
> hasn't been easy to replicate but we have dumps from most of the 0C1 or 0C4 
> abends.
>
> How does z/OS handle a situation where two COBOL programs that are 
> compiled at different ARCH levels and part of the same LE enclave? 
> Since the vendor code receives execution first, does it determine the 
> enclave level? I'm not sure what ARCH level the vendor compiles their 
> COBOL code (if they have any).
>
>
> Thank you,
>
> Brian Chapman
>
> --
> For IBM-MAIN subscribe

Re: mainframe hacking "success stories"?

2019-05-06 Thread ITschak Mugzach
well, there are some clients of my that got a copy of the RACF/Top secret
db by internal email. I was not only able to copy the file, but also to
send it outside the mainframe. People like me that do pentests for leaving
have seem almost everything. Last week I've noticed a client configuration
that allowed route command to all and no console auto login. the result is
that the command issued on the other lpar ran under *BYPASS* identity.
People does stupid things that help you completely destroy the system.

I still look for a published events.

ITschak
d to all.

On Mon, May 6, 2019 at 8:21 PM Charles Mills  wrote:

> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS
> a legitimate part of the mainframe, which it has been for 20 years or so).
> It was an exploit of CGI buffer overrun.
>
> #2: It drives me nuts to hear mainframers explain away mainframe breaches.
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't
> really a mainframe hack, they re-used a Windows password." "It wasn't
> really a mainframe hack ... whatever." If your CEO was standing in front of
> the press explaining how your company let x million credit card numbers go
> astray, would it matter HOW they got into your mainframe, or only that they
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows
> password, or whatever, you need to fix THAT, or risk having to explain to
> your CEO why he got fired (like Target's) for letting all those credit card
> numbers go astray.
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
>
> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
ITschak Mugzach
*|** IronSphere Platform* *|* *Information Security Contiguous Monitoring
for Legacy **|  *

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Paul Gilmartin
On Mon, 6 May 2019 10:21:25 -0700, Charles Mills wrote:

>#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
>legitimate part of the mainframe, which it has been for 20 years or so). It 
>was an exploit of CGI buffer overrun.
>
Was that Shellshock?  Is only bash susceptible to Shellshock.  That feature is 
so vulnerable
that it ought to be withdrawn; reliance on filtering inputs is hardly 
sufficient.

>#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It 
>wasn't really a mainframe hack, they got in through USS." "It wasn't really a 
>mainframe hack, they re-used a Windows password." "It wasn't really a 
>mainframe hack ... whatever." If your CEO was standing in front of the press 
>explaining how your company let x million credit card numbers go astray, would 
>it matter HOW they got into your mainframe, or only that they DID?" If your 
>mainframe is vulnerable to a USS hack, or a shared Windows password, or 
>whatever, you need to fix THAT, or risk having to explain to your CEO why he 
>got fired (like Target's) for letting all those credit card numbers go astray.
>
+1
It doesn't matter.

How does one audit for shared Windows passwords, even when they may be 
encrypted and salted?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


BLKSIZE=0 (was: Crazy ...)

2019-05-06 Thread Paul Gilmartin
On Mon, 6 May 2019 16:44:47 +, Seymour J Metz wrote:

>Not that I know of, other then the SMF records for the input and output.
>
>From: Paul Gilmartin
>Sent: Friday, May 3, 2019 1:42 PM
>
>When IEBCOPY reblocks a module, does it leave any audit trail?  That
>might be of interest in case of the OP's problem.
>
Amidst the nattering about 32760 vs. half-track vs. 4KiB vs. ...
I suggested coding BLKSIZE=0.  That received neither support nor
opposition.  So, I wonder:

Does coding BLKSIZE=0 ever lead to complete failure of a utility or product?
I encountered one many years ago.  It was promptly fixed by APAR.

Does BLKSIZE=0 ever lead to suboptimum performance?

There might be trivial exceptions for unlabelled tapes with DISP=MOD
or for IEBGENER where SYSUT1 is already adversely blocked.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


QSAM question

2019-05-06 Thread scott Ford
All:

I have a QSAM question. If I have a Cobol program writing to a QSAM file
and it runs out of space on the file, i.e.;  SB37 , can i recover from the
SB37 without manual intervention.
A possible condition handler ?

If I write and Assembler I/O routine to be called passing the data to and
writing to the QSAM file, the same question, my assumption is "yes" and can
someone point me to the manual I assume it DFSMSdfp working with datasets
...

Regards,
Scott

-- 



*IDMWORKS *

Scott Ford

z/OS Dev.




“By elevating a friend or Collegue you elevate yourself, by demeaning a
friend or collegue you demean yourself”



www.idmworks.com

scott.f...@idmworks.com

Blog: www.idmworks.com/blog





*The information contained in this email message and any attachment may be
privileged, confidential, proprietary or otherwise protected from
disclosure. If the reader of this message is not the intended recipient,
you are hereby notified that any dissemination, distribution, copying or
use of this message and any attachment is strictly prohibited. If you have
received this message in error, please notify us immediately by replying to
the message and permanently delete it from your computer and destroy any
printout thereof.*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
The Pirate Bay hack acquired a valid mainframe userid and password off of a 
Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
https://badcyber.com/a-history-of-a-hacking/ 

Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:

#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
legitimate part of the mainframe, which it has been for 20 years or so). It was 
an exploit of CGI buffer overrun.

#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It 
wasn't really a mainframe hack, they got in through USS." "It wasn't really a 
mainframe hack, they re-used a Windows password." "It wasn't really a mainframe 
hack ... whatever." If your CEO was standing in front of the press explaining 
how your company let x million credit card numbers go astray, would it matter 
HOW they got into your mainframe, or only that they DID?" If your mainframe is 
vulnerable to a USS hack, or a shared Windows password, or whatever, you need 
to fix THAT, or risk having to explain to your CEO why he got fired (like 
Target's) for letting all those credit card numbers go astray.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Sunday, May 5, 2019 10:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
mainframe credentials.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: QSAM question

2019-05-06 Thread John McKown
On Mon, May 6, 2019 at 1:15 PM scott Ford  wrote:

> All:
>
> I have a QSAM question. If I have a Cobol program writing to a QSAM file
> and it runs out of space on the file, i.e.;  SB37 , can i recover from the
> SB37 without manual intervention.
> A possible condition handler ?
>
> If I write and Assembler I/O routine to be called passing the data to and
> writing to the QSAM file, the same question, my assumption is "yes" and can
> someone point me to the manual I assume it DFSMSdfp working with datasets
> ...
>
> Regards,
> Scott
>
> --
>

Perhaps this?
https://www.ibm.com/support/knowledgecenter/en/SS6SG3_5.2.0/com.ibm.cobol52.ent.doc/PGandLR/ref/rlcdsusea.html


If not, there are Language Environment (CEExxx) calls to set up a
generalized recovery environment that you might be able to use.

https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.ceea300/clchdlr.htm

https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.ceea300/clc3srp.htm



-- 
This is clearly another case of too many mad scientists, and not enough
hunchbacks.


Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Library Server Being Replaced Clarification

2019-05-06 Thread Geoff Smith
Hi Folks

Regrettably, bookshelves were rarely, if ever, available outside the collection 
kits for individual download from the IBM Publications Center, and with good 
reason.  Softcopy Librarian (SCL) requires a set of files, called descriptor 
files, that are created as a by-product of the now defunct softcopy kit 
manufacturing process.  That’s why you cannot define the Library Server site as 
a source repository in SCL.  If you open SCL and click on the “Internet” 
repository, you’ll see a list of available softcopy kits.  

BookManager technology was very precise.  The shelves required that the book 
timestamps exactly match the shelf metadata.  This scheme was used to help 
ensure the currency of content for users who chose to manage their own local 
repositories.  The “z/OS Software Products Collection” shelves in SCL should 
contain all the content you need. However, if there are product shelves and 
books that you still need, let me know what they are.  I will see what I can 
do. 

For information about Library Server, see 
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.3.0/com.ibm.zos.v2r3.bks/bks.htm
 . For information about SCL and BookManager, see 
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.3.0/com.ibm.zos.v2r3.bkm/bkm.htm
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: QSAM question

2019-05-06 Thread Brian Chapman
Scott,

An assembler I/O module would handle this without much effort. Take a look
at the EXLST parameter on the file DCB.



*DCBEXIT  DS0H   *

* USING DCBXPLST,R1  *

* CLHHSI DCBXPRM1,B37   Abend code B37?  *

* BERECOVER Yes. Ignore abend*



*…*

*RECOVER  DS0H   *

**





* LTORG  *

*B37  EQU   X'B370' B37 Abend code   *

**   *

*DCBTEMP  DCB   DDNAME=,DSORG=PS,MACRF=PM,RECFM=FB,LRECL=2960, **

*   EXLST=ABNDXLST   *

**   *

*ABNDXLST DCAL1(EXLLASTE+EXLDCBAB),AL3(DCBEXIT) *


**   *

* IHAEXLST   *

* DCBD   *

**   *


Thank you,

Brian Chapman


On Mon, May 6, 2019 at 2:15 PM scott Ford  wrote:

> All:
>
> I have a QSAM question. If I have a Cobol program writing to a QSAM file
> and it runs out of space on the file, i.e.;  SB37 , can i recover from the
> SB37 without manual intervention.
> A possible condition handler ?
>
> If I write and Assembler I/O routine to be called passing the data to and
> writing to the QSAM file, the same question, my assumption is "yes" and can
> someone point me to the manual I assume it DFSMSdfp working with datasets
> ...
>
> Regards,
> Scott
>
> --
>
>
>
> *IDMWORKS *
>
> Scott Ford
>
> z/OS Dev.
>
>
>
>
> “By elevating a friend or Collegue you elevate yourself, by demeaning a
> friend or collegue you demean yourself”
>
>
>
> www.idmworks.com
>
> scott.f...@idmworks.com
>
> Blog: www.idmworks.com/blog
>
>
>
>
>
> *The information contained in this email message and any attachment may be
> privileged, confidential, proprietary or otherwise protected from
> disclosure. If the reader of this message is not the intended recipient,
> you are hereby notified that any dissemination, distribution, copying or
> use of this message and any attachment is strictly prohibited. If you have
> received this message in error, please notify us immediately by replying to
> the message and permanently delete it from your computer and destroy any
> printout thereof.*
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread ITschak Mugzach
Yes. Just logged on... And had access to all databases. This us how they
was caught. Too much queries per second.

בתאריך יום ב׳, 6 במאי 2019, 21:17, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> The Pirate Bay hack acquired a valid mainframe userid and password off of
> a Microsoft laptop. In effect, not really a mainframe hack. He just logged
> on. https://badcyber.com/a-history-of-a-hacking/
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS
> a legitimate part of the mainframe, which it has been for 20 years or so).
> It was an exploit of CGI buffer overrun.
>
> #2: It drives me nuts to hear mainframers explain away mainframe breaches.
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't
> really a mainframe hack, they re-used a Windows password." "It wasn't
> really a mainframe hack ... whatever." If your CEO was standing in front of
> the press explaining how your company let x million credit card numbers go
> astray, would it matter HOW they got into your mainframe, or only that they
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows
> password, or whatever, you need to fix THAT, or risk having to explain to
> your CEO why he got fired (like Target's) for letting all those credit card
> numbers go astray.
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
>
> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [External] Re: CBR3006I LIB ID not recognised

2019-05-06 Thread Pommier, Rex
Regarding the "how do the IBM hardware guys set the LIB ID" question - it is 
set during the initial configuration of the machine.  We were able to pick the 
library ID for the composite library as well as the distributed library name 
back when we put our first TS7720 on the floor.  When we upgraded to a TS7760 
clustered to a TS7760T at our DR location, we picked the IDs for the new nodes, 
tying them together using the composite library number.  The CE used the lib 
IDs when he configured the machines.

Rex 

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
John McKown
Sent: Monday, May 6, 2019 11:55 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [External] Re: CBR3006I LIB ID not recognised

On Mon, May 6, 2019 at 11:44 AM Peter  wrote:

> 'Note that 0600 is a virtual tape address, and 0800 is an ATL address'
>
> Guess 0600 and 800 is specific to your shop ? In my shop I have the 
> UCB set as 2800 and 2801 for 3590.
>

Correct. I could have been clearer about that.



>
> I get the same error message when I vary on 2800 and 2801
>
> How do the IBM hardware guys set the LIB ID in ATL ?( just curious I 
> am away from my DR site )
>

I have no idea. It may be settable in the firmware, or maybe it is "hard coded" 
into the hardware. I am thinking that it is conceptually like the CPUID on the 
z.

--
This is clearly another case of too many mad scientists, and not enough 
hunchbacks.


Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


The information contained in this message is confidential, protected from 
disclosure and may be legally privileged.  If the reader of this message is not 
the intended recipient or an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that any disclosure, 
distribution, copying, or any action taken or action omitted in reliance on it, 
is strictly prohibited and may be unlawful.  If you have received this 
communication in error, please notify us immediately by replying to this 
message and destroy the material in its entirety, whether in electronic or hard 
copy format.  Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Exactly.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 2:43 PM, ITschak Mugzach  wrote:

Yes. Just logged on... And had access to all databases. This us how they
was caught. Too much queries per second.

בתאריך יום ב׳, 6 במאי 2019, 21:17, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> The Pirate Bay hack acquired a valid mainframe userid and password off of
> a Microsoft laptop. In effect, not really a mainframe hack. He just logged
> on. https://badcyber.com/a-history-of-a-hacking/
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS
> a legitimate part of the mainframe, which it has been for 20 years or so).
> It was an exploit of CGI buffer overrun.
>
> #2: It drives me nuts to hear mainframers explain away mainframe breaches.
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't
> really a mainframe hack, they re-used a Windows password." "It wasn't
> really a mainframe hack ... whatever." If your CEO was standing in front of
> the press explaining how your company let x million credit card numbers go
> astray, would it matter HOW they got into your mainframe, or only that they
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows
> password, or whatever, you need to fix THAT, or risk having to explain to
> your CEO why he got fired (like Target's) for letting all those credit card
> numbers go astray.
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
>
> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: QSAM question

2019-05-06 Thread scott Ford
John and Brian,

A big thanks I thought so. Assembler i was aware of, but Cobol I hadnt had
the experience.
But it looks like it might *be doable*  thanks , friend John.

Scott

On Mon, May 6, 2019 at 2:40 PM Brian Chapman  wrote:

> Scott,
>
> An assembler I/O module would handle this without much effort. Take a look
> at the EXLST parameter on the file DCB.
>
>
>
> *DCBEXIT  DS0H   *
>
> * USING DCBXPLST,R1  *
>
> * CLHHSI DCBXPRM1,B37   Abend code B37?  *
>
> * BERECOVER Yes. Ignore abend*
>
>
>
> *…*
>
> *RECOVER  DS0H   *
>
> **
>
>
>
>
>
> * LTORG  *
>
> *B37  EQU   X'B370' B37 Abend code   *
>
> **   *
>
> *DCBTEMP  DCB   DDNAME=,DSORG=PS,MACRF=PM,RECFM=FB,LRECL=2960, **
>
> *   EXLST=ABNDXLST   *
>
> **   *
>
> *ABNDXLST DCAL1(EXLLASTE+EXLDCBAB),AL3(DCBEXIT) *
>
>
> **   *
>
> * IHAEXLST   *
>
> * DCBD   *
>
> **   *
>
>
> Thank you,
>
> Brian Chapman
>
>
> On Mon, May 6, 2019 at 2:15 PM scott Ford  wrote:
>
> > All:
> >
> > I have a QSAM question. If I have a Cobol program writing to a QSAM file
> > and it runs out of space on the file, i.e.;  SB37 , can i recover from
> the
> > SB37 without manual intervention.
> > A possible condition handler ?
> >
> > If I write and Assembler I/O routine to be called passing the data to and
> > writing to the QSAM file, the same question, my assumption is "yes" and
> can
> > someone point me to the manual I assume it DFSMSdfp working with datasets
> > ...
> >
> > Regards,
> > Scott
> >
> > --
> >
> >
> >
> > *IDMWORKS *
> >
> > Scott Ford
> >
> > z/OS Dev.
> >
> >
> >
> >
> > “By elevating a friend or Collegue you elevate yourself, by demeaning a
> > friend or collegue you demean yourself”
> >
> >
> >
> > www.idmworks.com
> >
> > scott.f...@idmworks.com
> >
> > Blog: www.idmworks.com/blog
> >
> >
> >
> >
> >
> > *The information contained in this email message and any attachment may
> be
> > privileged, confidential, proprietary or otherwise protected from
> > disclosure. If the reader of this message is not the intended recipient,
> > you are hereby notified that any dissemination, distribution, copying or
> > use of this message and any attachment is strictly prohibited. If you
> have
> > received this message in error, please notify us immediately by replying
> to
> > the message and permanently delete it from your computer and destroy any
> > printout thereof.*
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 



*IDMWORKS *

Scott Ford

z/OS Dev.




“By elevating a friend or Collegue you elevate yourself, by demeaning a
friend or collegue you demean yourself”



www.idmworks.com

scott.f...@idmworks.com

Blog: www.idmworks.com/blog





*The information contained in this email message and any attachment may be
privileged, confidential, proprietary or otherwise protected from
disclosure. If the reader of this message is not the intended recipient,
you are hereby notified that any dissemination, distribution, copying or
use of this message and any attachment is strictly prohibited. If you have
received this message in error, please notify us immediately by replying to
the message and permanently delete it from your computer and destroy any
printout thereof.*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Knutson, Samuel
The attacker created zero day exploits against z/OS in the wild allowing 
escalation of privilege and proved difficult to dislodge even once discovered.
Information available to the public supports this.  Phil Young has done a good 
job of dissecting the hack.

Philip Young - Smashing the Mainframe for Fun and Prison Time 
https://youtu.be/SjtyifWTqmc

And

How Hackers Breached a Government (and a Bank)
https://share.confex.com/share/124/webprogram/Handout/Session16982/How%20Hackers%20Breached%20a%20Government%20%28and%20a%20Bank%29.pdf

z/OS on IBMz hardware is the most securable environment in the world but as 
public evidence supports it was compromised.
It would seem fair to say the mainframe was hacked.

Best Regards,
Sam Knutson

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Bill Johnson
Sent: Monday, May 6, 2019 2:45 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Exactly.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 2:43 PM, ITschak Mugzach  wrote:

Yes. Just logged on... And had access to all databases. This us how they was 
caught. Too much queries per second.

בתאריך יום ב׳, 6 במאי 2019, 21:17, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>
> #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or so).
> It was an exploit of CGI buffer overrun.
>
> #2: It drives me nuts to hear mainframers explain away mainframe breaches.
> "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing
> in front of the press explaining how your company let x million credit
> card numbers go astray, would it matter HOW they got into your
> mainframe, or only that they DID?" If your mainframe is vulnerable to
> a USS hack, or a shared Windows password, or whatever, you need to fix
> THAT, or risk having to explain to your CEO why he got fired (like
> Target's) for letting all those credit card numbers go astray.
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
>
> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send
> email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send
> email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
The contents of this e-mail are intended for the named addressee only. It 
contains information that may be confidential. Unless you are the named 
addressee or an authorized designee, you may not copy or use it, or disclose it 
to anyone else. If you received it in error please notify us immediately and 
then destroy it

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Charles Mills
No.

>From the link you cite:

"According to various sources, the hackers succeeded in finding (and 
exploiting) at least 2 previously unknown errors enabling them to raise their 
authorisations in the system. One of them was an error in an IBM HTTP server 
and the other one was an error in the CNMEUNIX file, which in the default 
configuration has SUID 0 authorisations (which means that by leveraging on the 
errors it contains, one is able to execute commands with the system 
administrator’s authorisations)."

His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
problem for the MPAA lawyer whose account he accessed, but not for the 
mainframe in general.) The above mainframe security vulnerability was.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 11:17 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

The Pirate Bay hack acquired a valid mainframe userid and password off of a 
Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
https://badcyber.com/a-history-of-a-hacking/ 

Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:

#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
legitimate part of the mainframe, which it has been for 20 years or so). It was 
an exploit of CGI buffer overrun.

#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It 
wasn't really a mainframe hack, they got in through USS." "It wasn't really a 
mainframe hack, they re-used a Windows password." "It wasn't really a mainframe 
hack ... whatever." If your CEO was standing in front of the press explaining 
how your company let x million credit card numbers go astray, would it matter 
HOW they got into your mainframe, or only that they DID?" If your mainframe is 
vulnerable to a USS hack, or a shared Windows password, or whatever, you need 
to fix THAT, or risk having to explain to your CEO why he got fired (like 
Target's) for letting all those credit card numbers go astray.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Sunday, May 5, 2019 10:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
mainframe credentials.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bigendian Smalls
Charles is correct. He found vulnerabilities in DFS I believe.  Used that for 
privesc.  

> On May 6, 2019, at 21:17, Charles Mills  wrote:
> 
> No.
> 
> From the link you cite:
> 
> "According to various sources, the hackers succeeded in finding (and 
> exploiting) at least 2 previously unknown errors enabling them to raise their 
> authorisations in the system. One of them was an error in an IBM HTTP server 
> and the other one was an error in the CNMEUNIX file, which in the default 
> configuration has SUID 0 authorisations (which means that by leveraging on 
> the errors it contains, one is able to execute commands with the system 
> administrator’s authorisations)."
> 
> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
> problem for the MPAA lawyer whose account he accessed, but not for the 
> mainframe in general.) The above mainframe security vulnerability was.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Monday, May 6, 2019 11:17 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
> https://badcyber.com/a-history-of-a-hacking/ 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> 
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
> legitimate part of the mainframe, which it has been for 20 years or so). It 
> was an exploit of CGI buffer overrun.
> 
> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
> really a mainframe hack, they re-used a Windows password." "It wasn't really 
> a mainframe hack ... whatever." If your CEO was standing in front of the 
> press explaining how your company let x million credit card numbers go 
> astray, would it matter HOW they got into your mainframe, or only that they 
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
> password, or whatever, you need to fix THAT, or risk having to explain to 
> your CEO why he got fired (like Target's) for letting all those credit card 
> numbers go astray.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
> mainframe credentials.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Possibly, but after they logged on with a valid userid acquired from a hacked 
laptop.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:29 PM, Bigendian Smalls 
 wrote:

Charles is correct. He found vulnerabilities in DFS I believe.  Used that for 
privesc.  

> On May 6, 2019, at 21:17, Charles Mills  wrote:
> 
> No.
> 
> From the link you cite:
> 
> "According to various sources, the hackers succeeded in finding (and 
> exploiting) at least 2 previously unknown errors enabling them to raise their 
> authorisations in the system. One of them was an error in an IBM HTTP server 
> and the other one was an error in the CNMEUNIX file, which in the default 
> configuration has SUID 0 authorisations (which means that by leveraging on 
> the errors it contains, one is able to execute commands with the system 
> administrator’s authorisations)."
> 
> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
> problem for the MPAA lawyer whose account he accessed, but not for the 
> mainframe in general.) The above mainframe security vulnerability was.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Monday, May 6, 2019 11:17 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
> https://badcyber.com/a-history-of-a-hacking/ 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> 
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
> legitimate part of the mainframe, which it has been for 20 years or so). It 
> was an exploit of CGI buffer overrun.
> 
> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
> really a mainframe hack, they re-used a Windows password." "It wasn't really 
> a mainframe hack ... whatever." If your CEO was standing in front of the 
> press explaining how your company let x million credit card numbers go 
> astray, would it matter HOW they got into your mainframe, or only that they 
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
> password, or whatever, you need to fix THAT, or risk having to explain to 
> your CEO why he got fired (like Target's) for letting all those credit card 
> numbers go astray.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
> mainframe credentials.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Still never would have occurred without a valid userid.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:

No.

>From the link you cite:

"According to various sources, the hackers succeeded in finding (and 
exploiting) at least 2 previously unknown errors enabling them to raise their 
authorisations in the system. One of them was an error in an IBM HTTP server 
and the other one was an error in the CNMEUNIX file, which in the default 
configuration has SUID 0 authorisations (which means that by leveraging on the 
errors it contains, one is able to execute commands with the system 
administrator’s authorisations)."

His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
problem for the MPAA lawyer whose account he accessed, but not for the 
mainframe in general.) The above mainframe security vulnerability was.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 11:17 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

The Pirate Bay hack acquired a valid mainframe userid and password off of a 
Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
https://badcyber.com/a-history-of-a-hacking/ 

Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:

#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
legitimate part of the mainframe, which it has been for 20 years or so). It was 
an exploit of CGI buffer overrun.

#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It 
wasn't really a mainframe hack, they got in through USS." "It wasn't really a 
mainframe hack, they re-used a Windows password." "It wasn't really a mainframe 
hack ... whatever." If your CEO was standing in front of the press explaining 
how your company let x million credit card numbers go astray, would it matter 
HOW they got into your mainframe, or only that they DID?" If your mainframe is 
vulnerable to a USS hack, or a shared Windows password, or whatever, you need 
to fix THAT, or risk having to explain to your CEO why he got fired (like 
Target's) for letting all those credit card numbers go astray.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Sunday, May 5, 2019 10:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
mainframe credentials.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bigendian Smalls
Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today. 

> On May 6, 2019, at 21:43, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Still never would have occurred without a valid userid.
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> 
> No.
> 
> From the link you cite:
> 
> "According to various sources, the hackers succeeded in finding (and 
> exploiting) at least 2 previously unknown errors enabling them to raise their 
> authorisations in the system. One of them was an error in an IBM HTTP server 
> and the other one was an error in the CNMEUNIX file, which in the default 
> configuration has SUID 0 authorisations (which means that by leveraging on 
> the errors it contains, one is able to execute commands with the system 
> administrator’s authorisations)."
> 
> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
> problem for the MPAA lawyer whose account he accessed, but not for the 
> mainframe in general.) The above mainframe security vulnerability was.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Monday, May 6, 2019 11:17 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
> https://badcyber.com/a-history-of-a-hacking/ 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> 
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
> legitimate part of the mainframe, which it has been for 20 years or so). It 
> was an exploit of CGI buffer overrun.
> 
> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
> really a mainframe hack, they re-used a Windows password." "It wasn't really 
> a mainframe hack ... whatever." If your CEO was standing in front of the 
> press explaining how your company let x million credit card numbers go 
> astray, would it matter HOW they got into your mainframe, or only that they 
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
> password, or whatever, you need to fix THAT, or risk having to explain to 
> your CEO why he got fired (like Target's) for letting all those credit card 
> numbers go astray.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
> mainframe credentials.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread ITschak Mugzach
Zos 1.x used to ship uads with users tso00 to tso03 (or 1-4), so passwords
could be collected from another system. Used this to penetrate the
mainframe. Tx god ibm stop shipping pre loaded uads.

בתאריך יום ב׳, 6 במאי 2019, 22:54, מאת Bigendian Smalls ‏<
mainfr...@bigendiansmalls.com>:

> Which is how 80% of all the hacks today start.  Find purchase and advance
> your position. This is how the game is played. It was as classic of a hack
> as anything today.
>
> > On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Still never would have occurred without a valid userid.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> >
> > No.
> >
> > From the link you cite:
> >
> > "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >
> > His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Monday, May 6, 2019 11:17 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> >
> > #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >
> > #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Sunday, May 5, 2019 10:00 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Completely different. Hacking Microsoft is way easier. 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
 wrote:

Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today. 

> On May 6, 2019, at 21:43, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Still never would have occurred without a valid userid.
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> 
> No.
> 
> From the link you cite:
> 
> "According to various sources, the hackers succeeded in finding (and 
> exploiting) at least 2 previously unknown errors enabling them to raise their 
> authorisations in the system. One of them was an error in an IBM HTTP server 
> and the other one was an error in the CNMEUNIX file, which in the default 
> configuration has SUID 0 authorisations (which means that by leveraging on 
> the errors it contains, one is able to execute commands with the system 
> administrator’s authorisations)."
> 
> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
> problem for the MPAA lawyer whose account he accessed, but not for the 
> mainframe in general.) The above mainframe security vulnerability was.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Monday, May 6, 2019 11:17 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
> https://badcyber.com/a-history-of-a-hacking/ 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> 
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
> legitimate part of the mainframe, which it has been for 20 years or so). It 
> was an exploit of CGI buffer overrun.
> 
> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
> really a mainframe hack, they re-used a Windows password." "It wasn't really 
> a mainframe hack ... whatever." If your CEO was standing in front of the 
> press explaining how your company let x million credit card numbers go 
> astray, would it matter HOW they got into your mainframe, or only that they 
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
> password, or whatever, you need to fix THAT, or risk having to explain to 
> your CEO why he got fired (like Target's) for letting all those credit card 
> numbers go astray.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
> mainframe credentials.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
So was it hacked 100’s of times then? Since it’s so easy?


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:04 PM, ITschak Mugzach  wrote:

Zos 1.x used to ship uads with users tso00 to tso03 (or 1-4), so passwords
could be collected from another system. Used this to penetrate the
mainframe. Tx god ibm stop shipping pre loaded uads.

בתאריך יום ב׳, 6 במאי 2019, 22:54, מאת Bigendian Smalls ‏<
mainfr...@bigendiansmalls.com>:

> Which is how 80% of all the hacks today start.  Find purchase and advance
> your position. This is how the game is played. It was as classic of a hack
> as anything today.
>
> > On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Still never would have occurred without a valid userid.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> >
> > No.
> >
> > From the link you cite:
> >
> > "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >
> > His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Monday, May 6, 2019 11:17 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> >
> > #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >
> > #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Sunday, May 5, 2019 10:00 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscrib

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bigendian Smalls
Bill, would you care to back that sweeping generalization up with some detail? 

> On May 6, 2019, at 22:06, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Completely different. Hacking Microsoft is way easier. 
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
>  wrote:
> 
> Which is how 80% of all the hacks today start.  Find purchase and advance 
> your position. This is how the game is played. It was as classic of a hack as 
> anything today. 
> 
>> On May 6, 2019, at 21:43, Bill Johnson 
>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>> 
>> Still never would have occurred without a valid userid.
>> 
>> 
>> Sent from Yahoo Mail for iPhone
>> 
>> 
>> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
>> 
>> No.
>> 
>> From the link you cite:
>> 
>> "According to various sources, the hackers succeeded in finding (and 
>> exploiting) at least 2 previously unknown errors enabling them to raise 
>> their authorisations in the system. One of them was an error in an IBM HTTP 
>> server and the other one was an error in the CNMEUNIX file, which in the 
>> default configuration has SUID 0 authorisations (which means that by 
>> leveraging on the errors it contains, one is able to execute commands with 
>> the system administrator’s authorisations)."
>> 
>> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
>> problem for the MPAA lawyer whose account he accessed, but not for the 
>> mainframe in general.) The above mainframe security vulnerability was.
>> 
>> Charles
>> 
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>> Behalf Of Bill Johnson
>> Sent: Monday, May 6, 2019 11:17 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: mainframe hacking "success stories"?
>> 
>> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
>> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
>> https://badcyber.com/a-history-of-a-hacking/ 
>> 
>> Sent from Yahoo Mail for iPhone
>> 
>> 
>> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>> 
>> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
>> legitimate part of the mainframe, which it has been for 20 years or so). It 
>> was an exploit of CGI buffer overrun.
>> 
>> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
>> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
>> really a mainframe hack, they re-used a Windows password." "It wasn't really 
>> a mainframe hack ... whatever." If your CEO was standing in front of the 
>> press explaining how your company let x million credit card numbers go 
>> astray, would it matter HOW they got into your mainframe, or only that they 
>> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
>> password, or whatever, you need to fix THAT, or risk having to explain to 
>> your CEO why he got fired (like Target's) for letting all those credit card 
>> numbers go astray.
>> 
>> Charles
>> 
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>> Behalf Of Bill Johnson
>> Sent: Sunday, May 5, 2019 10:00 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: mainframe hacking "success stories"?
>> 
>> Wasn’t really a mainframe hack. It was a laptop hack that acquired 
>> legitimate mainframe credentials.
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
40 years of mainframe experience and you are talking a handful of mainframe 
“hacks” versus thousands of Microsoft hacks. Maybe tens of thousands.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
 wrote:

Bill, would you care to back that sweeping generalization up with some detail? 

> On May 6, 2019, at 22:06, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Completely different. Hacking Microsoft is way easier. 
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
>  wrote:
> 
> Which is how 80% of all the hacks today start.  Find purchase and advance 
> your position. This is how the game is played. It was as classic of a hack as 
> anything today. 
> 
>> On May 6, 2019, at 21:43, Bill Johnson 
>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>> 
>> Still never would have occurred without a valid userid.
>> 
>> 
>> Sent from Yahoo Mail for iPhone
>> 
>> 
>> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
>> 
>> No.
>> 
>> From the link you cite:
>> 
>> "According to various sources, the hackers succeeded in finding (and 
>> exploiting) at least 2 previously unknown errors enabling them to raise 
>> their authorisations in the system. One of them was an error in an IBM HTTP 
>> server and the other one was an error in the CNMEUNIX file, which in the 
>> default configuration has SUID 0 authorisations (which means that by 
>> leveraging on the errors it contains, one is able to execute commands with 
>> the system administrator’s authorisations)."
>> 
>> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
>> problem for the MPAA lawyer whose account he accessed, but not for the 
>> mainframe in general.) The above mainframe security vulnerability was.
>> 
>> Charles
>> 
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>> Behalf Of Bill Johnson
>> Sent: Monday, May 6, 2019 11:17 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: mainframe hacking "success stories"?
>> 
>> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
>> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
>> https://badcyber.com/a-history-of-a-hacking/ 
>> 
>> Sent from Yahoo Mail for iPhone
>> 
>> 
>> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>> 
>> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
>> legitimate part of the mainframe, which it has been for 20 years or so). It 
>> was an exploit of CGI buffer overrun.
>> 
>> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
>> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
>> really a mainframe hack, they re-used a Windows password." "It wasn't really 
>> a mainframe hack ... whatever." If your CEO was standing in front of the 
>> press explaining how your company let x million credit card numbers go 
>> astray, would it matter HOW they got into your mainframe, or only that they 
>> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
>> password, or whatever, you need to fix THAT, or risk having to explain to 
>> your CEO why he got fired (like Target's) for letting all those credit card 
>> numbers go astray.
>> 
>> Charles
>> 
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>> Behalf Of Bill Johnson
>> Sent: Sunday, May 5, 2019 10:00 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: mainframe hacking "success stories"?
>> 
>> Wasn’t really a mainframe hack. It was a laptop hack that acquired 
>> legitimate mainframe credentials.
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive 

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
It’s why banks stay on the mainframe. Security.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
 wrote:

Bill, would you care to back that sweeping generalization up with some detail? 

> On May 6, 2019, at 22:06, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Completely different. Hacking Microsoft is way easier. 
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
>  wrote:
> 
> Which is how 80% of all the hacks today start.  Find purchase and advance 
> your position. This is how the game is played. It was as classic of a hack as 
> anything today. 
> 
>> On May 6, 2019, at 21:43, Bill Johnson 
>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>> 
>> Still never would have occurred without a valid userid.
>> 
>> 
>> Sent from Yahoo Mail for iPhone
>> 
>> 
>> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
>> 
>> No.
>> 
>> From the link you cite:
>> 
>> "According to various sources, the hackers succeeded in finding (and 
>> exploiting) at least 2 previously unknown errors enabling them to raise 
>> their authorisations in the system. One of them was an error in an IBM HTTP 
>> server and the other one was an error in the CNMEUNIX file, which in the 
>> default configuration has SUID 0 authorisations (which means that by 
>> leveraging on the errors it contains, one is able to execute commands with 
>> the system administrator’s authorisations)."
>> 
>> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
>> problem for the MPAA lawyer whose account he accessed, but not for the 
>> mainframe in general.) The above mainframe security vulnerability was.
>> 
>> Charles
>> 
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>> Behalf Of Bill Johnson
>> Sent: Monday, May 6, 2019 11:17 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: mainframe hacking "success stories"?
>> 
>> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
>> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
>> https://badcyber.com/a-history-of-a-hacking/ 
>> 
>> Sent from Yahoo Mail for iPhone
>> 
>> 
>> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>> 
>> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
>> legitimate part of the mainframe, which it has been for 20 years or so). It 
>> was an exploit of CGI buffer overrun.
>> 
>> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
>> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
>> really a mainframe hack, they re-used a Windows password." "It wasn't really 
>> a mainframe hack ... whatever." If your CEO was standing in front of the 
>> press explaining how your company let x million credit card numbers go 
>> astray, would it matter HOW they got into your mainframe, or only that they 
>> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
>> password, or whatever, you need to fix THAT, or risk having to explain to 
>> your CEO why he got fired (like Target's) for letting all those credit card 
>> numbers go astray.
>> 
>> Charles
>> 
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>> Behalf Of Bill Johnson
>> Sent: Sunday, May 5, 2019 10:00 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: mainframe hacking "success stories"?
>> 
>> Wasn’t really a mainframe hack. It was a laptop hack that acquired 
>> legitimate mainframe credentials.
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: QSAM question

2019-05-06 Thread Binyamin Dissen
Not a COBOL programmer, but wouldn't file status 34 be issued in such a case?

Or DECLARATIVEs?

On Mon, 6 May 2019 14:15:06 -0400 scott Ford  wrote:

:>I have a QSAM question. If I have a Cobol program writing to a QSAM file
:>and it runs out of space on the file, i.e.;  SB37 , can i recover from the
:>SB37 without manual intervention.
:>A possible condition handler ?

:>If I write and Assembler I/O routine to be called passing the data to and
:>writing to the QSAM file, the same question, my assumption is "yes" and can
:>someone point me to the manual I assume it DFSMSdfp working with datasets

--
Binyamin Dissen 
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread ITschak Mugzach
No. It has nothing to do with security. It is a lagend. Penetrated all my
clients. The reason is convertion complexity, tco and simplicity. Security,
in a nut shell is what your sysprog does. Only few security guys left to
guide them.



בתאריך יום ב׳, 6 במאי 2019, 23:18, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> It’s why banks stay on the mainframe. Security.
>
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
>
> Bill, would you care to back that sweeping generalization up with some
> detail?
>
> > On May 6, 2019, at 22:06, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Completely different. Hacking Microsoft is way easier.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
> >
> > Which is how 80% of all the hacks today start.  Find purchase and
> advance your position. This is how the game is played. It was as classic of
> a hack as anything today.
> >
> >> On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >>
> >> Still never would have occurred without a valid userid.
> >>
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 3:18 PM, Charles Mills 
> wrote:
> >>
> >> No.
> >>
> >> From the link you cite:
> >>
> >> "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >>
> >> His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Monday, May 6, 2019 11:17 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 1:21 PM, Charles Mills 
> wrote:
> >>
> >> #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >>
> >> #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Sunday, May 5, 2019 10:00 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists.

Re: QSAM question

2019-05-06 Thread scott Ford
Binyamin,

Sir your correct.

Todah Rabah 

Scott

On Mon, May 6, 2019 at 4:21 PM Binyamin Dissen 
wrote:

> Not a COBOL programmer, but wouldn't file status 34 be issued in such a
> case?
>
> Or DECLARATIVEs?
>
> On Mon, 6 May 2019 14:15:06 -0400 scott Ford  wrote:
>
> :>I have a QSAM question. If I have a Cobol program writing to a QSAM file
> :>and it runs out of space on the file, i.e.;  SB37 , can i recover from
> the
> :>SB37 without manual intervention.
> :>A possible condition handler ?
>
> :>If I write and Assembler I/O routine to be called passing the data to and
> :>writing to the QSAM file, the same question, my assumption is "yes" and
> can
> :>someone point me to the manual I assume it DFSMSdfp working with datasets
>
> --
> Binyamin Dissen 
> http://www.dissensoftware.com
>
> Director, Dissen Software, Bar & Grill - Israel
>
>
> Should you use the mailblocks package and expect a response from me,
> you should preauthorize the dissensoftware.com domain.
>
> I very rarely bother responding to challenge/response systems,
> especially those from irresponsible companies.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
-- 
Scott Ford
IDMWORKS
z/OS Development

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: QSAM question

2019-05-06 Thread Clark Morris
[Default] On 6 May 2019 11:15:28 -0700, in bit.listserv.ibm-main
idfli...@gmail.com (scott Ford) wrote:

>All:
>
>I have a QSAM question. If I have a Cobol program writing to a QSAM file
>and it runs out of space on the file, i.e.;  SB37 , can i recover from the
>SB37 without manual intervention.
>A possible condition handler ?

If you just want to extend the data set proper use of SMS or a package
like Stop X37 is probably the answer.  If there is some other action
to be taken that is unique to the program a status code can be
associated with the file and all I-O related to that file can and must
be checked for non-zero completion codes (34 on output is a file full
or X37 condition for QSAM).  This includes OPEN and CLOSE statements.
Failure to do so can lead to interesting and normally bad results.  To
the best of my knowledge COBOL does not have anything that would allow
you to extend the file or number of tape volumes allocated to the
file.  

Clark Morris  
>
>If I write and Assembler I/O routine to be called passing the data to and
>writing to the QSAM file, the same question, my assumption is "yes" and can
>someone point me to the manual I assume it DFSMSdfp working with datasets
>...
>
>Regards,
>Scott

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: BLKSIZE=0 (was: Crazy ...)

2019-05-06 Thread Steve Smith
BLKSIZE=0 requests "System-Determined Block size".  It is indeed the best
option.  Presumably the "system" has all the relevant facts and knowledge
at its disposal.  Which is likely at least as much as you know.

However, BLKSIZE is one of the many things carried over from medieval times
where the amount of core used, how long your reads stayed connected to a
channel, how efficiently DASD at $1000/mb was used, and various other
no-longer-relevant considerations factored into that specification.

sas

On Mon, May 6, 2019 at 2:08 PM Paul Gilmartin <
000433f07816-dmarc-requ...@listserv.ua.edu> wrote:

> On Mon, 6 May 2019 16:44:47 +, Seymour J Metz wrote:
>
> >Not that I know of, other then the SMF records for the input and output.
> >
> >From: Paul Gilmartin
> >Sent: Friday, May 3, 2019 1:42 PM
> >
> >When IEBCOPY reblocks a module, does it leave any audit trail?  That
> >might be of interest in case of the OP's problem.
> >
> Amidst the nattering about 32760 vs. half-track vs. 4KiB vs. ...
> I suggested coding BLKSIZE=0.  That received neither support nor
> opposition.  So, I wonder:
>
> Does coding BLKSIZE=0 ever lead to complete failure of a utility or
> product?
> I encountered one many years ago.  It was promptly fixed by APAR.
>
> Does BLKSIZE=0 ever lead to suboptimum performance?
>
> There might be trivial exceptions for unlabelled tapes with DISP=MOD
> or for IEBGENER where SYSUT1 is already adversely blocked.
>
> -- gil
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
sas

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Charles Mills
Well, RSM and Vanguard and so forth claim they never do a pen test that does 
not succeed, so I guess yes, hacked hundreds of times.

Of course, maybe hackers aren't as smart as pen testers ...

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 1:07 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

So was it hacked 100’s of times then? Since it’s so easy?


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:04 PM, ITschak Mugzach  wrote:

Zos 1.x used to ship uads with users tso00 to tso03 (or 1-4), so passwords
could be collected from another system. Used this to penetrate the
mainframe. Tx god ibm stop shipping pre loaded uads.

בתאריך יום ב׳, 6 במאי 2019, 22:54, מאת Bigendian Smalls ‏<
mainfr...@bigendiansmalls.com>:

> Which is how 80% of all the hacks today start.  Find purchase and advance
> your position. This is how the game is played. It was as classic of a hack
> as anything today.
>
> > On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Still never would have occurred without a valid userid.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> >
> > No.
> >
> > From the link you cite:
> >
> > "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >
> > His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Monday, May 6, 2019 11:17 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> >
> > #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >
> > #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Sunday, May 5, 2019 10:00 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --

Re: mainframe hacking "success stories"?

2019-05-06 Thread Charles Mills
You're right. And you get to explain to your CEO how it wasn't really a 
mainframe hack because they had a userid and Windows gets hacked all the time.

Denial ain't just a river in Egypt.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 1:06 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Completely different. Hacking Microsoft is way easier. 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
 wrote:

Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today. 

> On May 6, 2019, at 21:43, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Still never would have occurred without a valid userid.
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> 
> No.
> 
> From the link you cite:
> 
> "According to various sources, the hackers succeeded in finding (and 
> exploiting) at least 2 previously unknown errors enabling them to raise their 
> authorisations in the system. One of them was an error in an IBM HTTP server 
> and the other one was an error in the CNMEUNIX file, which in the default 
> configuration has SUID 0 authorisations (which means that by leveraging on 
> the errors it contains, one is able to execute commands with the system 
> administrator’s authorisations)."
> 
> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
> problem for the MPAA lawyer whose account he accessed, but not for the 
> mainframe in general.) The above mainframe security vulnerability was.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Monday, May 6, 2019 11:17 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
> https://badcyber.com/a-history-of-a-hacking/ 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> 
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
> legitimate part of the mainframe, which it has been for 20 years or so). It 
> was an exploit of CGI buffer overrun.
> 
> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
> really a mainframe hack, they re-used a Windows password." "It wasn't really 
> a mainframe hack ... whatever." If your CEO was standing in front of the 
> press explaining how your company let x million credit card numbers go 
> astray, would it matter HOW they got into your mainframe, or only that they 
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
> password, or whatever, you need to fix THAT, or risk having to explain to 
> your CEO why he got fired (like Target's) for letting all those credit card 
> numbers go astray.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
> mainframe credentials.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

---

Re: mainframe hacking "success stories"?

2019-05-06 Thread Charles Mills
> How does one audit for shared Windows passwords, even when they may be 
> encrypted and salted?

Good question.

I guess the answer to this and all similar questions is "MFA". Two factor 
authentication solves a lot of problems, or at least makes them a whole lot 
less likely.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Monday, May 6, 2019 10:54 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

On Mon, 6 May 2019 10:21:25 -0700, Charles Mills wrote:

>#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
>legitimate part of the mainframe, which it has been for 20 years or so). It 
>was an exploit of CGI buffer overrun.
>
Was that Shellshock?  Is only bash susceptible to Shellshock.  That feature is 
so vulnerable
that it ought to be withdrawn; reliance on filtering inputs is hardly 
sufficient.

>#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It 
>wasn't really a mainframe hack, they got in through USS." "It wasn't really a 
>mainframe hack, they re-used a Windows password." "It wasn't really a 
>mainframe hack ... whatever." If your CEO was standing in front of the press 
>explaining how your company let x million credit card numbers go astray, would 
>it matter HOW they got into your mainframe, or only that they DID?" If your 
>mainframe is vulnerable to a USS hack, or a shared Windows password, or 
>whatever, you need to fix THAT, or risk having to explain to your CEO why he 
>got fired (like Target's) for letting all those credit card numbers go astray.
>
+1
It doesn't matter.

How does one audit for shared Windows passwords, even when they may be 
encrypted and salted?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Grant Taylor
On 5/6/19 1:42 PM, Bill Johnson wrote:
> Still never would have occurred without a valid userid.

Think about it this way:

Would a DBA be able to get away saying that "the DB was copied because a
mainframe operator reused their mainframe credentials as their
credentials to access the RDBMS."?  (Regardless of how the credentials
were actually acquired.)

My bet is that such a response would not hold any water and the DBA
would be expected to better secure the RDBMS.

I feel like the same methodology & standards apply to the mainframe as
it does to the RDBMS.



-- 
Grant. . . .
unix || die

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
I was a DBA. Anyone who has valid access, no matter how they got it, doesn’t 
qualify as a hack of that platform. Nearly every bank in the world still uses 
the mainframe. Why? Because it is almost impenetrable by regular hacking means. 
So do most insurance companies for the same reason. 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 7:30 PM, Grant Taylor 
<023065957af1-dmarc-requ...@listserv.ua.edu> wrote:

On 5/6/19 1:42 PM, Bill Johnson wrote:
> Still never would have occurred without a valid userid.

Think about it this way:

Would a DBA be able to get away saying that "the DB was copied because a
mainframe operator reused their mainframe credentials as their
credentials to access the RDBMS."?  (Regardless of how the credentials
were actually acquired.)

My bet is that such a response would not hold any water and the DBA
would be expected to better secure the RDBMS.

I feel like the same methodology & standards apply to the mainframe as
it does to the RDBMS.



-- 
Grant. . . .
unix || die

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
The mainframe hasn’t even been hack 5 times.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 7:04 PM, Charles Mills  wrote:

Well, RSM and Vanguard and so forth claim they never do a pen test that does 
not succeed, so I guess yes, hacked hundreds of times.

Of course, maybe hackers aren't as smart as pen testers ...

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 1:07 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

So was it hacked 100’s of times then? Since it’s so easy?


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:04 PM, ITschak Mugzach  wrote:

Zos 1.x used to ship uads with users tso00 to tso03 (or 1-4), so passwords
could be collected from another system. Used this to penetrate the
mainframe. Tx god ibm stop shipping pre loaded uads.

בתאריך יום ב׳, 6 במאי 2019, 22:54, מאת Bigendian Smalls ‏<
mainfr...@bigendiansmalls.com>:

> Which is how 80% of all the hacks today start.  Find purchase and advance
> your position. This is how the game is played. It was as classic of a hack
> as anything today.
>
> > On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Still never would have occurred without a valid userid.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> >
> > No.
> >
> > From the link you cite:
> >
> > "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >
> > His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Monday, May 6, 2019 11:17 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> >
> > #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >
> > #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >
> > Charles
> >
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> > Sent: Sunday, May 5, 2019 10:00 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: mainframe hacking "success stories"?
> >
> > Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> >
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send emai

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Yeah, how dare a lurker challenge the people who dominate the board.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 7:06 PM, Charles Mills  wrote:

You're right. And you get to explain to your CEO how it wasn't really a 
mainframe hack because they had a userid and Windows gets hacked all the time.

Denial ain't just a river in Egypt.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 1:06 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Completely different. Hacking Microsoft is way easier. 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
 wrote:

Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today. 

> On May 6, 2019, at 21:43, Bill Johnson 
> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Still never would have occurred without a valid userid.
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
> 
> No.
> 
> From the link you cite:
> 
> "According to various sources, the hackers succeeded in finding (and 
> exploiting) at least 2 previously unknown errors enabling them to raise their 
> authorisations in the system. One of them was an error in an IBM HTTP server 
> and the other one was an error in the CNMEUNIX file, which in the default 
> configuration has SUID 0 authorisations (which means that by leveraging on 
> the errors it contains, one is able to execute commands with the system 
> administrator’s authorisations)."
> 
> His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
> problem for the MPAA lawyer whose account he accessed, but not for the 
> mainframe in general.) The above mainframe security vulnerability was.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Monday, May 6, 2019 11:17 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
> Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
> https://badcyber.com/a-history-of-a-hacking/ 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
> 
> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
> legitimate part of the mainframe, which it has been for 20 years or so). It 
> was an exploit of CGI buffer overrun.
> 
> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
> really a mainframe hack, they re-used a Windows password." "It wasn't really 
> a mainframe hack ... whatever." If your CEO was standing in front of the 
> press explaining how your company let x million credit card numbers go 
> astray, would it matter HOW they got into your mainframe, or only that they 
> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
> password, or whatever, you need to fix THAT, or risk having to explain to 
> your CEO why he got fired (like Target's) for letting all those credit card 
> numbers go astray.
> 
> Charles
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Bill Johnson
> Sent: Sunday, May 5, 2019 10:00 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: mainframe hacking "success stories"?
> 
> Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
> mainframe credentials.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MA

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
LOL, sure.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:23 PM, ITschak Mugzach  wrote:

No. It has nothing to do with security. It is a lagend. Penetrated all my
clients. The reason is convertion complexity, tco and simplicity. Security,
in a nut shell is what your sysprog does. Only few security guys left to
guide them.



בתאריך יום ב׳, 6 במאי 2019, 23:18, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> It’s why banks stay on the mainframe. Security.
>
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
>
> Bill, would you care to back that sweeping generalization up with some
> detail?
>
> > On May 6, 2019, at 22:06, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Completely different. Hacking Microsoft is way easier.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
> >
> > Which is how 80% of all the hacks today start.  Find purchase and
> advance your position. This is how the game is played. It was as classic of
> a hack as anything today.
> >
> >> On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >>
> >> Still never would have occurred without a valid userid.
> >>
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 3:18 PM, Charles Mills 
> wrote:
> >>
> >> No.
> >>
> >> From the link you cite:
> >>
> >> "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >>
> >> His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Monday, May 6, 2019 11:17 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 1:21 PM, Charles Mills 
> wrote:
> >>
> >> #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >>
> >> #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Sunday, May 5, 2019 10:00 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> 

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Wrong. 
https://www.americanbanker.com/news/why-citi-is-buying-ibms-new-mainframe-for-mobile-transactions
 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:23 PM, ITschak Mugzach  wrote:

No. It has nothing to do with security. It is a lagend. Penetrated all my
clients. The reason is convertion complexity, tco and simplicity. Security,
in a nut shell is what your sysprog does. Only few security guys left to
guide them.



בתאריך יום ב׳, 6 במאי 2019, 23:18, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> It’s why banks stay on the mainframe. Security.
>
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
>
> Bill, would you care to back that sweeping generalization up with some
> detail?
>
> > On May 6, 2019, at 22:06, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Completely different. Hacking Microsoft is way easier.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
> >
> > Which is how 80% of all the hacks today start.  Find purchase and
> advance your position. This is how the game is played. It was as classic of
> a hack as anything today.
> >
> >> On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >>
> >> Still never would have occurred without a valid userid.
> >>
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 3:18 PM, Charles Mills 
> wrote:
> >>
> >> No.
> >>
> >> From the link you cite:
> >>
> >> "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >>
> >> His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Monday, May 6, 2019 11:17 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 1:21 PM, Charles Mills 
> wrote:
> >>
> >> #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >>
> >> #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Sunday, May 5, 2019 10:00 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the messag

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Read up.
https://www.allerin.com/blog/why-do-banks-still-use-mainframes 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:23 PM, ITschak Mugzach  wrote:

No. It has nothing to do with security. It is a lagend. Penetrated all my
clients. The reason is convertion complexity, tco and simplicity. Security,
in a nut shell is what your sysprog does. Only few security guys left to
guide them.



בתאריך יום ב׳, 6 במאי 2019, 23:18, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> It’s why banks stay on the mainframe. Security.
>
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
>
> Bill, would you care to back that sweeping generalization up with some
> detail?
>
> > On May 6, 2019, at 22:06, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Completely different. Hacking Microsoft is way easier.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
> >
> > Which is how 80% of all the hacks today start.  Find purchase and
> advance your position. This is how the game is played. It was as classic of
> a hack as anything today.
> >
> >> On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >>
> >> Still never would have occurred without a valid userid.
> >>
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 3:18 PM, Charles Mills 
> wrote:
> >>
> >> No.
> >>
> >> From the link you cite:
> >>
> >> "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >>
> >> His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Monday, May 6, 2019 11:17 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 1:21 PM, Charles Mills 
> wrote:
> >>
> >> #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >>
> >> #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Sunday, May 5, 2019 10:00 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
Security: Banks deal with a lot of sensitive and confidential information. 
Security is a non-negotiable concern with them. Mainframes have security built 
into them from the ground up. Through cryptographic hardware acceleration and 
secure operating system, mainframes fulfill the critical requirement of keeping 
the user and internal data protected.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:23 PM, ITschak Mugzach  wrote:

No. It has nothing to do with security. It is a lagend. Penetrated all my
clients. The reason is convertion complexity, tco and simplicity. Security,
in a nut shell is what your sysprog does. Only few security guys left to
guide them.



בתאריך יום ב׳, 6 במאי 2019, 23:18, מאת Bill Johnson ‏<
0047540adefe-dmarc-requ...@listserv.ua.edu>:

> It’s why banks stay on the mainframe. Security.
>
>
> Sent from Yahoo Mail for iPhone
>
>
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
>
> Bill, would you care to back that sweeping generalization up with some
> detail?
>
> > On May 6, 2019, at 22:06, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Completely different. Hacking Microsoft is way easier.
> >
> >
> > Sent from Yahoo Mail for iPhone
> >
> >
> > On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls <
> mainfr...@bigendiansmalls.com> wrote:
> >
> > Which is how 80% of all the hacks today start.  Find purchase and
> advance your position. This is how the game is played. It was as classic of
> a hack as anything today.
> >
> >> On May 6, 2019, at 21:43, Bill Johnson <
> 0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
> >>
> >> Still never would have occurred without a valid userid.
> >>
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 3:18 PM, Charles Mills 
> wrote:
> >>
> >> No.
> >>
> >> From the link you cite:
> >>
> >> "According to various sources, the hackers succeeded in finding (and
> exploiting) at least 2 previously unknown errors enabling them to raise
> their authorisations in the system. One of them was an error in an IBM HTTP
> server and the other one was an error in the CNMEUNIX file, which in the
> default configuration has SUID 0 authorisations (which means that by
> leveraging on the errors it contains, one is able to execute commands with
> the system administrator’s authorisations)."
> >>
> >> His "user" access to InfoTorg was not a problem for the mainframe. (It
> was a problem for the MPAA lawyer whose account he accessed, but not for
> the mainframe in general.) The above mainframe security vulnerability was.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Monday, May 6, 2019 11:17 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> The Pirate Bay hack acquired a valid mainframe userid and password off
> of a Microsoft laptop. In effect, not really a mainframe hack. He just
> logged on. https://badcyber.com/a-history-of-a-hacking/
> >>
> >> Sent from Yahoo Mail for iPhone
> >>
> >>
> >> On Monday, May 6, 2019, 1:21 PM, Charles Mills 
> wrote:
> >>
> >> #1: Noo. It was a legitimate mainframe hack (assuming you consider
> USS a legitimate part of the mainframe, which it has been for 20 years or
> so). It was an exploit of CGI buffer overrun.
> >>
> >> #2: It drives me nuts to hear mainframers explain away mainframe
> breaches. "It wasn't really a mainframe hack, they got in through USS." "It
> wasn't really a mainframe hack, they re-used a Windows password." "It
> wasn't really a mainframe hack ... whatever." If your CEO was standing in
> front of the press explaining how your company let x million credit card
> numbers go astray, would it matter HOW they got into your mainframe, or
> only that they DID?" If your mainframe is vulnerable to a USS hack, or a
> shared Windows password, or whatever, you need to fix THAT, or risk having
> to explain to your CEO why he got fired (like Target's) for letting all
> those credit card numbers go astray.
> >>
> >> Charles
> >>
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Bill Johnson
> >> Sent: Sunday, May 5, 2019 10:00 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: Re: mainframe hacking "success stories"?
> >>
> >> Wasn’t really a mainframe hack. It was a laptop hack that acquired
> legitimate mainframe credentials.
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >>
> >>
> >>
> >> --
> >> For IBM-MAIN subscribe / signoff / archive access instructions,
> >> send email to lists...@listserv.ua

Re: BLKSIZE=0 (was: Crazy ...)

2019-05-06 Thread Steve Thompson
What about BUFL=? As I recall, I used to use this to keep from 
having problems with concatenations...


By having a buffer length equal to or larger than any buffer one 
might read... And we really were beyond CORE in those days. But 
it is true, C-STORE was expensive.


Regards,
Steve Thompson

On 5/6/19 6:52 PM, Steve Smith wrote:

BLKSIZE=0 requests "System-Determined Block size".  It is indeed the best
option.  Presumably the "system" has all the relevant facts and knowledge
at its disposal.  Which is likely at least as much as you know.

However, BLKSIZE is one of the many things carried over from medieval times
where the amount of core used, how long your reads stayed connected to a
channel, how efficiently DASD at $1000/mb was used, and various other
no-longer-relevant considerations factored into that specification.

sas



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Tom Brennan

Ok, but why is Windows easier to hack than the mainframe?

Personally, I'd find a mainframe far easier to hack because I know a 
little bit about control blocks, APF auth, SVC's, subsystems, address 
spaces, RACF, etc., and I know far less about the equivalents on 
Windows.  But of course the first step is to get any kind of userid, and 
that's done by pretty-much the same methods - regardless of platform.


On 5/6/2019 1:18 PM, Bill Johnson wrote:

It’s why banks stay on the mainframe. Security.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
 wrote:

Bill, would you care to back that sweeping generalization up with some detail?


On May 6, 2019, at 22:06, Bill Johnson 
<0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:

Completely different. Hacking Microsoft is way easier.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
 wrote:

Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today.


On May 6, 2019, at 21:43, Bill Johnson 
<0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:

Still never would have occurred without a valid userid.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:

No.

 From the link you cite:

"According to various sources, the hackers succeeded in finding (and exploiting) at 
least 2 previously unknown errors enabling them to raise their authorisations in the 
system. One of them was an error in an IBM HTTP server and the other one was an error in 
the CNMEUNIX file, which in the default configuration has SUID 0 authorisations (which 
means that by leveraging on the errors it contains, one is able to execute commands with 
the system administrator’s authorisations)."

His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
problem for the MPAA lawyer whose account he accessed, but not for the mainframe in 
general.) The above mainframe security vulnerability was.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 11:17 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

The Pirate Bay hack acquired a valid mainframe userid and password off of a 
Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
https://badcyber.com/a-history-of-a-hacking/

Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:

#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
legitimate part of the mainframe, which it has been for 20 years or so). It was 
an exploit of CGI buffer overrun.

#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It wasn't really a mainframe 
hack, they got in through USS." "It wasn't really a mainframe hack, they re-used a Windows 
password." "It wasn't really a mainframe hack ... whatever." If your CEO was standing in front of 
the press explaining how your company let x million credit card numbers go astray, would it matter HOW they got 
into your mainframe, or only that they DID?" If your mainframe is vulnerable to a USS hack, or a shared 
Windows password, or whatever, you need to fix THAT, or risk having to explain to your CEO why he got fired (like 
Target's) for letting all those credit card numbers go astray.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Sunday, May 5, 2019 10:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
mainframe credentials.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




--
For IBM-MAIN subscribe

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
A plethora of reasons.
Lack of emphasis on security by MSFT. More interest in selling the next release 
than securing each release.
Buggy code. Went to a security seminar once where it was stated that MSFT code 
had one bug for every 25 lines of code. IBM was around one bug every 250 lines 
and NASA was one bug every 10,000 lines. Called KLOC.
MSFT is also more available. There are millions of possible targets. That’s why 
Safari was less exposed to hack than IE. IE had a much larger install base so 
was more targeted.
Many other reasons.
Hackers tend to target the easier platform.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 9:27 PM, Tom Brennan  
wrote:

Ok, but why is Windows easier to hack than the mainframe?

Personally, I'd find a mainframe far easier to hack because I know a 
little bit about control blocks, APF auth, SVC's, subsystems, address 
spaces, RACF, etc., and I know far less about the equivalents on 
Windows.  But of course the first step is to get any kind of userid, and 
that's done by pretty-much the same methods - regardless of platform.

On 5/6/2019 1:18 PM, Bill Johnson wrote:
> It’s why banks stay on the mainframe. Security.
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
>  wrote:
> 
> Bill, would you care to back that sweeping generalization up with some detail?
> 
>> On May 6, 2019, at 22:06, Bill Johnson 
>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>>
>> Completely different. Hacking Microsoft is way easier.
>>
>>
>> Sent from Yahoo Mail for iPhone
>>
>>
>> On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
>>  wrote:
>>
>> Which is how 80% of all the hacks today start.  Find purchase and advance 
>> your position. This is how the game is played. It was as classic of a hack 
>> as anything today.
>>
>>> On May 6, 2019, at 21:43, Bill Johnson 
>>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>>>
>>> Still never would have occurred without a valid userid.
>>>
>>>
>>> Sent from Yahoo Mail for iPhone
>>>
>>>
>>> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
>>>
>>> No.
>>>
>>>  From the link you cite:
>>>
>>> "According to various sources, the hackers succeeded in finding (and 
>>> exploiting) at least 2 previously unknown errors enabling them to raise 
>>> their authorisations in the system. One of them was an error in an IBM HTTP 
>>> server and the other one was an error in the CNMEUNIX file, which in the 
>>> default configuration has SUID 0 authorisations (which means that by 
>>> leveraging on the errors it contains, one is able to execute commands with 
>>> the system administrator’s authorisations)."
>>>
>>> His "user" access to InfoTorg was not a problem for the mainframe. (It was 
>>> a problem for the MPAA lawyer whose account he accessed, but not for the 
>>> mainframe in general.) The above mainframe security vulnerability was.
>>>
>>> Charles
>>>
>>>
>>> -Original Message-
>>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>>> Behalf Of Bill Johnson
>>> Sent: Monday, May 6, 2019 11:17 AM
>>> To: IBM-MAIN@LISTSERV.UA.EDU
>>> Subject: Re: mainframe hacking "success stories"?
>>>
>>> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
>>> Microsoft laptop. In effect, not really a mainframe hack. He just logged 
>>> on. https://badcyber.com/a-history-of-a-hacking/
>>>
>>> Sent from Yahoo Mail for iPhone
>>>
>>>
>>> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>>>
>>> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS 
>>> a legitimate part of the mainframe, which it has been for 20 years or so). 
>>> It was an exploit of CGI buffer overrun.
>>>
>>> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
>>> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
>>> really a mainframe hack, they re-used a Windows password." "It wasn't 
>>> really a mainframe hack ... whatever." If your CEO was standing in front of 
>>> the press explaining how your company let x million credit card numbers go 
>>> astray, would it matter HOW they got into your mainframe, or only that they 
>>> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
>>> password, or whatever, you need to fix THAT, or risk having to explain to 
>>> your CEO why he got fired (like Target's) for letting all those credit card 
>>> numbers go astray.
>>>
>>> Charles
>>>
>>>
>>> -Original Message-
>>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>>> Behalf Of Bill Johnson
>>> Sent: Sunday, May 5, 2019 10:00 AM
>>> To: IBM-MAIN@LISTSERV.UA.EDU
>>> Subject: Re: mainframe hacking "success stories"?
>>>
>>> Wasn’t really a mainframe hack. It was a laptop hack that acquired 
>>> legitimate mainframe credentials.
>>>
>>> --
>>> For IBM-MAIN subscribe / signoff / archive

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
How do you get a userid for a mainframe hack attempt? How do you insure it’s 
one with decent security access? Knowing very few have APF access.
I’ve never actually seen a mainframe hacked in 40 years and 15 different shops. 
Also never heard of one at shops in the Ohio, Pennsylvania area that I didn’t 
work. I’ve heard of potential holes but never seen it happen.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 9:27 PM, Tom Brennan  
wrote:

Ok, but why is Windows easier to hack than the mainframe?

Personally, I'd find a mainframe far easier to hack because I know a 
little bit about control blocks, APF auth, SVC's, subsystems, address 
spaces, RACF, etc., and I know far less about the equivalents on 
Windows.  But of course the first step is to get any kind of userid, and 
that's done by pretty-much the same methods - regardless of platform.

On 5/6/2019 1:18 PM, Bill Johnson wrote:
> It’s why banks stay on the mainframe. Security.
> 
> 
> Sent from Yahoo Mail for iPhone
> 
> 
> On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
>  wrote:
> 
> Bill, would you care to back that sweeping generalization up with some detail?
> 
>> On May 6, 2019, at 22:06, Bill Johnson 
>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>>
>> Completely different. Hacking Microsoft is way easier.
>>
>>
>> Sent from Yahoo Mail for iPhone
>>
>>
>> On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
>>  wrote:
>>
>> Which is how 80% of all the hacks today start.  Find purchase and advance 
>> your position. This is how the game is played. It was as classic of a hack 
>> as anything today.
>>
>>> On May 6, 2019, at 21:43, Bill Johnson 
>>> <0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:
>>>
>>> Still never would have occurred without a valid userid.
>>>
>>>
>>> Sent from Yahoo Mail for iPhone
>>>
>>>
>>> On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:
>>>
>>> No.
>>>
>>>  From the link you cite:
>>>
>>> "According to various sources, the hackers succeeded in finding (and 
>>> exploiting) at least 2 previously unknown errors enabling them to raise 
>>> their authorisations in the system. One of them was an error in an IBM HTTP 
>>> server and the other one was an error in the CNMEUNIX file, which in the 
>>> default configuration has SUID 0 authorisations (which means that by 
>>> leveraging on the errors it contains, one is able to execute commands with 
>>> the system administrator’s authorisations)."
>>>
>>> His "user" access to InfoTorg was not a problem for the mainframe. (It was 
>>> a problem for the MPAA lawyer whose account he accessed, but not for the 
>>> mainframe in general.) The above mainframe security vulnerability was.
>>>
>>> Charles
>>>
>>>
>>> -Original Message-
>>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>>> Behalf Of Bill Johnson
>>> Sent: Monday, May 6, 2019 11:17 AM
>>> To: IBM-MAIN@LISTSERV.UA.EDU
>>> Subject: Re: mainframe hacking "success stories"?
>>>
>>> The Pirate Bay hack acquired a valid mainframe userid and password off of a 
>>> Microsoft laptop. In effect, not really a mainframe hack. He just logged 
>>> on. https://badcyber.com/a-history-of-a-hacking/
>>>
>>> Sent from Yahoo Mail for iPhone
>>>
>>>
>>> On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:
>>>
>>> #1: Noo. It was a legitimate mainframe hack (assuming you consider USS 
>>> a legitimate part of the mainframe, which it has been for 20 years or so). 
>>> It was an exploit of CGI buffer overrun.
>>>
>>> #2: It drives me nuts to hear mainframers explain away mainframe breaches. 
>>> "It wasn't really a mainframe hack, they got in through USS." "It wasn't 
>>> really a mainframe hack, they re-used a Windows password." "It wasn't 
>>> really a mainframe hack ... whatever." If your CEO was standing in front of 
>>> the press explaining how your company let x million credit card numbers go 
>>> astray, would it matter HOW they got into your mainframe, or only that they 
>>> DID?" If your mainframe is vulnerable to a USS hack, or a shared Windows 
>>> password, or whatever, you need to fix THAT, or risk having to explain to 
>>> your CEO why he got fired (like Target's) for letting all those credit card 
>>> numbers go astray.
>>>
>>> Charles
>>>
>>>
>>> -Original Message-
>>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>>> Behalf Of Bill Johnson
>>> Sent: Sunday, May 5, 2019 10:00 AM
>>> To: IBM-MAIN@LISTSERV.UA.EDU
>>> Subject: Re: mainframe hacking "success stories"?
>>>
>>> Wasn’t really a mainframe hack. It was a laptop hack that acquired 
>>> legitimate mainframe credentials.
>>>
>>> --
>>> For IBM-MAIN subscribe / signoff / archive access instructions,
>>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>>
>>>
>>>
>>> --
>>> For IBM-MAIN subscribe / signoff /

Re: mainframe hacking "success stories"?

2019-05-06 Thread Bob Bridges
I know there are other reasons, but the one I always trot out at this point in 
the conversation is that Windows is a younger OS.  The mainframe has been 
around a couple more decades than Windows, so there's been more time to spot 
and plug holes.

Plus, for the first decade or so of Windows' life it was essentially a 
one-operator OS; whatever you did to Windows was just you, not (usually) 
someone reaching in from outside.

Then, too, it took a while for MS to get religion about security.

But first and foremost, IMVHO, it's that MVS has been around so much longer.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* If the Earth were flat, cats would have pushed everything off it by now. */


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Tom Brennan
Sent: Monday, May 6, 2019 21:27

Ok, but why is Windows easier to hack than the mainframe?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bob Bridges
Itschak, I'm not sure what you're asking but there's quite a bit of 
documentation on the Logica break-in.  I had to do a report on it for my 
employers a few years ago, and I cited six or seven sources for it.  Do you 
want them?  I can send you a copy, although I wouldn't want you to think I'm 
claiming expertise in the subject.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* If the Earth were flat, cats would have pushed everything off it by now. */


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of ITschak Mugzach
Sent: Sunday, May 5, 2019 13:13

I know "how to", doing that  every day. I am looking for real events that
was published.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bob Bridges
"Once they’d downloaded the RACF database, they subjected it to a 
password-cracking tool.  John the Ripper is one such tool, widely available on 
the internet.  On Feb 28, about the same time the RACF database was downloaded, 
some questions appeared on the mailing list PaulDotCom about hashing methods 
for RACF; by March 3rd, apparently in response, John the Ripper had been 
enhanced to include the capability of working on RACF passwords, in 
collaboration with another tool call CRACF.

"In the Zauf article is this description:  'Creating a password hash algorithm 
works like this:  After entering the password, it is padded with spaces, if 
necessary, to a length of 8 bytes.  Each character is then XORed with x‘55’ and 
shifted left one bit.  Then the user ID is DES-encrypted, using the modified 
password as the DES key.  Developers took a few days to determine the algorithm 
and modify John the Ripper.  Now the utility excels at hashing the RACF 
database.'  It also mentioned a source-code module named racf2john.c, 'a tool 
that converts database file exported in the input data, read for JTR' [Google’s 
translation from Polish].

"By way of testing, investigators attempted to use these tools themselves to 
crack RACF passwords.  They found that a great many passwords could be 
extracted, that they were easy to discover by dictionary attack, that they were 
not very complex and in many cases that they’d been unchanged from the default 
when the ID was created.  Using a standalone PC they cracked about 30 000 
passwords (out of 120 000 on Applicat’s database) in  'a couple of days'."

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* If the Earth were flat, cats would have pushed everything off it by now. */


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Monday, May 6, 2019 13:14

I *believe* that was done by investigators after the fact, attempting to 
determine how the attack might have been done. I don't recall that there is 
compelling evidence that Svartholm actually did that.

It *is* trivially easy to do, assuming (a.) read access to the DB and (b.) 
old-style password storage.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of David Spiegel
Sent: Sunday, May 5, 2019 8:02 AM

One of the tricks he pulled was to offload the RACF Database to a PC and 
Dictionary Attack it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Bill Johnson
In most shops only 2 people have the required access to the RACF database. 


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 11:06 PM, Bob Bridges  wrote:

"Once they’d downloaded the RACF database, they subjected it to a 
password-cracking tool.  John the Ripper is one such tool, widely available on 
the internet.  On Feb 28, about the same time the RACF database was downloaded, 
some questions appeared on the mailing list PaulDotCom about hashing methods 
for RACF; by March 3rd, apparently in response, John the Ripper had been 
enhanced to include the capability of working on RACF passwords, in 
collaboration with another tool call CRACF.

"In the Zauf article is this description:  'Creating a password hash algorithm 
works like this:  After entering the password, it is padded with spaces, if 
necessary, to a length of 8 bytes.  Each character is then XORed with x‘55’ and 
shifted left one bit.  Then the user ID is DES-encrypted, using the modified 
password as the DES key.  Developers took a few days to determine the algorithm 
and modify John the Ripper.  Now the utility excels at hashing the RACF 
database.'  It also mentioned a source-code module named racf2john.c, 'a tool 
that converts database file exported in the input data, read for JTR' [Google’s 
translation from Polish].

"By way of testing, investigators attempted to use these tools themselves to 
crack RACF passwords.  They found that a great many passwords could be 
extracted, that they were easy to discover by dictionary attack, that they were 
not very complex and in many cases that they’d been unchanged from the default 
when the ID was created.  Using a standalone PC they cracked about 30 000 
passwords (out of 120 000 on Applicat’s database) in  'a couple of days'."

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* If the Earth were flat, cats would have pushed everything off it by now. */


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Monday, May 6, 2019 13:14

I *believe* that was done by investigators after the fact, attempting to 
determine how the attack might have been done. I don't recall that there is 
compelling evidence that Svartholm actually did that.

It *is* trivially easy to do, assuming (a.) read access to the DB and (b.) 
old-style password storage.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of David Spiegel
Sent: Sunday, May 5, 2019 8:02 AM

One of the tricks he pulled was to offload the RACF Database to a PC and 
Dictionary Attack it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: mainframe hacking "success stories"?

2019-05-06 Thread Tom Brennan
Here's one:  By acting dumb (well, even more than usual) I got the Help 
Desk where I worked to give me my name, the prod system id, my userid, 
and a password reset.  I gave no information other than calling from my 
own desk phone.


The real reason for the call was that I heard they were using the same 
string for all password reset requests, and (as one of the RACF support 
people) I wanted to surreptitiously test that.  But when they answered 
the phone with "Hello Tom Brennan", I thought I'd take the ruse as far 
as possible.


The Help Desk wants to help.

On 5/6/2019 7:03 PM, Bill Johnson wrote:

How do you get a userid for a mainframe hack attempt? How do you insure it’s 
one with decent security access? Knowing very few have APF access.
I’ve never actually seen a mainframe hacked in 40 years and 15 different shops. 
Also never heard of one at shops in the Ohio, Pennsylvania area that I didn’t 
work. I’ve heard of potential holes but never seen it happen.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 9:27 PM, Tom Brennan  
wrote:

Ok, but why is Windows easier to hack than the mainframe?

Personally, I'd find a mainframe far easier to hack because I know a
little bit about control blocks, APF auth, SVC's, subsystems, address
spaces, RACF, etc., and I know far less about the equivalents on
Windows.  But of course the first step is to get any kind of userid, and
that's done by pretty-much the same methods - regardless of platform.

On 5/6/2019 1:18 PM, Bill Johnson wrote:

It’s why banks stay on the mainframe. Security.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
 wrote:

Bill, would you care to back that sweeping generalization up with some detail?


On May 6, 2019, at 22:06, Bill Johnson 
<0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:

Completely different. Hacking Microsoft is way easier.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
 wrote:

Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today.


On May 6, 2019, at 21:43, Bill Johnson 
<0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:

Still never would have occurred without a valid userid.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:

No.

   From the link you cite:

"According to various sources, the hackers succeeded in finding (and exploiting) at 
least 2 previously unknown errors enabling them to raise their authorisations in the 
system. One of them was an error in an IBM HTTP server and the other one was an error in 
the CNMEUNIX file, which in the default configuration has SUID 0 authorisations (which 
means that by leveraging on the errors it contains, one is able to execute commands with 
the system administrator’s authorisations)."

His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
problem for the MPAA lawyer whose account he accessed, but not for the mainframe in 
general.) The above mainframe security vulnerability was.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 11:17 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

The Pirate Bay hack acquired a valid mainframe userid and password off of a 
Microsoft laptop. In effect, not really a mainframe hack. He just logged on. 
https://badcyber.com/a-history-of-a-hacking/

Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 1:21 PM, Charles Mills  wrote:

#1: Noo. It was a legitimate mainframe hack (assuming you consider USS a 
legitimate part of the mainframe, which it has been for 20 years or so). It was 
an exploit of CGI buffer overrun.

#2: It drives me nuts to hear mainframers explain away mainframe breaches. "It wasn't really a mainframe 
hack, they got in through USS." "It wasn't really a mainframe hack, they re-used a Windows 
password." "It wasn't really a mainframe hack ... whatever." If your CEO was standing in front of 
the press explaining how your company let x million credit card numbers go astray, would it matter HOW they got 
into your mainframe, or only that they DID?" If your mainframe is vulnerable to a USS hack, or a shared 
Windows password, or whatever, you need to fix THAT, or risk having to explain to your CEO why he got fired (like 
Target's) for letting all those credit card numbers go astray.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Sunday, May 5, 2019 10:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

Wasn’t really a mainframe hack. It was a laptop hack that acquired legitimate 
mainframe credentials.

--

Re: mainframe hacking "success stories"?

2019-05-06 Thread Tom Brennan
For the mainframe, one of the words I like to use is "Integrity".  The 
hardware designers and programmers did not want to let any error, no 
matter how small, go unnoticed.  A quick example:  On a real 3278 
terminal if you tried to type on top of a protected field, the box made 
a clicky noise and locked the keyboard from further input until you 
pressed Reset.  This is Integrity, protecting the data entry clerk from 
missing even a single character on that COBOL coding form.


Same with the OS of course - with all the logging and SMF and error 
recovery and message manuals a mile long.  You don't see anything close 
to this in Windows and Linux/Unix.  In fact, on those platforms it's 
sometimes the opposite... Call a subroutine, forget to check the return 
code, and the program continues on as if nothing happened - good luck. 
On the mainframe, if I call an SVC and it fails I get an abend by 
default with a decent message.  That's just one small part of the 
built-in integrity the mainframe has over the other platforms.


One of my old jokes working with Unix/Linux was:  If you got an error 
that makes no sense, check to see if the disk ran out of space.  I was 
surprised how often this turned out to be true.


Over the years one of the bigger Windows/Unix hacks has been buffer 
overflows, I believe based on string copies with no supplied length (you 
keep copying bytes until you hit a zero).  But variable fields on the 
mainframe typically had a length byte or halfword - so we avoided one of 
the bigger hacking issues.  Well, until USS came along and C started 
being used for mainframe coding.


But this all makes no difference when you find passwords.txt on a 
sysprog's laptop because the security folks decided the password needs 
to be changed each month to something impossible to remember.  That's 
more the point I'm trying to make.


On 5/6/2019 6:52 PM, Bill Johnson wrote:

A plethora of reasons.
Lack of emphasis on security by MSFT. More interest in selling the next release 
than securing each release.
Buggy code. Went to a security seminar once where it was stated that MSFT code 
had one bug for every 25 lines of code. IBM was around one bug every 250 lines 
and NASA was one bug every 10,000 lines. Called KLOC.
MSFT is also more available. There are millions of possible targets. That’s why 
Safari was less exposed to hack than IE. IE had a much larger install base so 
was more targeted.
Many other reasons.
Hackers tend to target the easier platform.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 9:27 PM, Tom Brennan  
wrote:

Ok, but why is Windows easier to hack than the mainframe?

Personally, I'd find a mainframe far easier to hack because I know a
little bit about control blocks, APF auth, SVC's, subsystems, address
spaces, RACF, etc., and I know far less about the equivalents on
Windows.  But of course the first step is to get any kind of userid, and
that's done by pretty-much the same methods - regardless of platform.

On 5/6/2019 1:18 PM, Bill Johnson wrote:

It’s why banks stay on the mainframe. Security.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 4:09 PM, Bigendian Smalls 
 wrote:

Bill, would you care to back that sweeping generalization up with some detail?


On May 6, 2019, at 22:06, Bill Johnson 
<0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:

Completely different. Hacking Microsoft is way easier.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:53 PM, Bigendian Smalls 
 wrote:

Which is how 80% of all the hacks today start.  Find purchase and advance your 
position. This is how the game is played. It was as classic of a hack as 
anything today.


On May 6, 2019, at 21:43, Bill Johnson 
<0047540adefe-dmarc-requ...@listserv.ua.edu> wrote:

Still never would have occurred without a valid userid.


Sent from Yahoo Mail for iPhone


On Monday, May 6, 2019, 3:18 PM, Charles Mills  wrote:

No.

   From the link you cite:

"According to various sources, the hackers succeeded in finding (and exploiting) at 
least 2 previously unknown errors enabling them to raise their authorisations in the 
system. One of them was an error in an IBM HTTP server and the other one was an error in 
the CNMEUNIX file, which in the default configuration has SUID 0 authorisations (which 
means that by leveraging on the errors it contains, one is able to execute commands with 
the system administrator’s authorisations)."

His "user" access to InfoTorg was not a problem for the mainframe. (It was a 
problem for the MPAA lawyer whose account he accessed, but not for the mainframe in 
general.) The above mainframe security vulnerability was.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Johnson
Sent: Monday, May 6, 2019 11:17 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: mainframe hacking "success stories"?

The Pirate Bay hack acquired a valid mainframe userid and password off of a

Re: mainframe hacking "success stories"?

2019-05-06 Thread Timothy Sipples
Bill Johnson wrote:
>Mainframes have security built into them from the ground up.
>Through cryptographic hardware acceleration and secure operating
>system, mainframes fulfill the critical requirement of keeping
>the user and internal data protected.

There are many excellent security attributes included with and available
for IBM mainframes, true, agreed. Moreover, the architectural patterns that
mainframes uniquely facilitate can be quite helpful in raising and
enforcing enterprise security levels. More highly centralized, well
managed, richer information services offer certain inherent
security-related advantages.

That said, I'm quite concerned (paranoid, even) because these wonderful
security features so frequently either aren't implemented at all or are
implemented badly, inconsistently. Also, unfortunately, there are far too
many organizations running unsupported technologies with known security
vulnerabilities, and there are even more that do not have reasonable,
timely preventive maintenance programs that they execute consistently and
well.

I was probably working on helping a government get SSL (then, now evolved
into TLS) encryption turned on for ALL their mainframe network connections
("internal" and "external"), and with certificate authentications (client
and server), literally 20 years ago today. SSL significantly predates z/OS.
Yet here we are, 20 years later, and so many organizations haven't even
done that much. It's upsetting.

I agree with the comment that there's always room for improvement, often
ample improvement. I assert that if you aren't concerned (or more) then you
aren't even awake.

Be careful out there, always. I don't think there was ever a time to rest
easy, and this era certainly isn't such a time.


Timothy Sipples
IT Architect Executive, Industry Solutions, IBM Z & LinuxONE
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN