Hi,
I was asked to attempt to link a object deck from VSE in z/OS.
The program is a COBOL2 program, but the source has been lost.
The first few lines of the object deck are:
W PHASE JKHIVX52,S+X'00'
W MODE AMODE(31),RMODE(ANY)
W.ESD .. ..JKHIVX52.§.©..÷0
After that there are many (A lit
I think the question came up from someone who had not had to administer
ZFS/HFS before. It was one of these "where do I start" questions. Of
course once you are familiar with an area it gets easier.
Colin
On Wed, 6 Oct 2021 at 22:04, Radoslaw Skorupka
wrote:
> W dniu 06.10.2021 o 16:44, Ed Jaff
The phase statement is VSE specific, so it will not run without change. If
you send it to me privately I'll see if I can bind it.
On Thu, 7 Oct 2021 at 08:22, Gadi Ben-Avi wrote:
> Hi,
> I was asked to attempt to link a object deck from VSE in z/OS.
> The program is a COBOL2 program, but the so
Furuya-san,
I will check the SG settings. Thank you for your advice.
Best regards,
Toyokazu Kobayashi
- Original Message -
From: "Nobuhiko Furuya"
Newsgroups: bit.listserv.ibm-main
To:
Sent: Thursday, October 07, 2021 1:29 PM
Subject: Re: DFDSS Restore IGD306I problem
Hi -san,
Y
MVS format object decks always have x'02' in column 1 and not "W", so that
would be a problem. You would also need to link with an appropriate Cobol
runtime library, and those would have been EOL circa 30 years ago. Worst
case you might have to disassemble and recreate this module, eliminating
th
I removed the W by shifting the who deck to the left.
I then removed the PHASE statement.
This didn't help much.
The message from the Binder are:
IEW2278I B352 INVOCATION PARAMETERS - LIST,XREF,NOLET,MAP
IEW2322I 1220 1MODE AMODE(31),RMODE(ANY)
On 10/6/2021 9:25 PM, Bruce Hewson wrote:
The above does require MXG & SAS - Hope you have it.,
If not, I would think some quick editing in ISPF might suffice. For example:
===> X ALL;F X'03' 219 ALL;DEL ALL X
would get you pretty close...
--
Phoenix Software International
Edward E. Jaffe
8
Well, I'm not z/OS Unix guru, but it seems pretty easy to me.
First - mounted filesystems can be listed using several methods
including SDSF, MVS command, ish pull down menu, BPXPRMFS member.
Second - automount.
Third - "dummy, lost, forgotten" HFS, that means the dataset exists, but
it is not
https://www.ibm.com/docs/en/zos/2.4.0?topic=output-dcollect-record-structure
Defines the fields in DCOLLECT output data set.
Includes HFS and zFS field definitions.
On Thu, Oct 7, 2021 at 9:37 AM Radoslaw Skorupka wrote:
>
> Well, I'm not z/OS Unix guru, but it seems pretty easy to me.
> First -
I, too, put DSN first. More importantly to me, I put it on a separate
line. That makes ISPF File Tailoring more reliable and I'm often wanting
to change the data sets I'm pointing at.
But then I'm not exactly in a Production shop.
Martin Packer
WW z/OS Performance, Capacity and Architecture, I
On Thu, 7 Oct 2021 10:37:33 +0200, Radoslaw Skorupka wrote:
>
>IMHO more important is to have a procedure/process/project to convert
>HFS to ZFS. Some filesystems can be unmounted with no harm to
>production, but some cannot.
>
Mentioned here a few weeks ago:
From:Bill Schoen
Date: W
Hi Brian,
That was part of why I posed the initial question. Is IBM
repackaging/reselling JED (or some other JCL checker) or are they rolling their
own? Guess we'll have to wait until next year to see what it's all about. My
company is considering getting a JCL checker (no sales calls please
bpxwmigf will migrate an hfs (and more recently zfs) file system to a zfs file
system while mounted and in-use.
This is intended to be non-disruptive in production.
Should you find an hfs file system you need after you migrate to 2.5, open a
problem with IBM support.
Although not usable on 2.5, t
We use SmartJCL (SEGUS).
Thank You and Please Be Safe!
Len Sasso
Systems Administrator Senior
CSRA, A General Dynamics Information Technology Company
327 Columbia TPKE
Rensselaer, NY 12144
TEAM: Together Everyone Achieves More
Office Hours: M-F 7 AM - 3:45 PM
Vacation: ?
Phone: (518) 257-
I ordered the Customized Offering Driver to install z/OS 2.5 the day that z/OS
2.5 was available. I thought it was supposed to be ready to use zOSMF to do the
install? zOSMF doesn’t come up. It complains about the angel process not being
up, but it certainly is.
If this is really an authenticat
Does the custom pac for 2.5 still provide the Installing your order doc? since
if 2.5 requires z/osmf then there is an assumption on IBM's part that security
had already been setup and you are already using z/osmf
Carmen Vitullo
-Original Message-
From: Rich
To: IBM-M
I haven’t actually ordered 2.5 yet. I wanted to make sure the COD was set up
correctly first.
But, I agree. If this is the way of the future, the COD should be ready to go
with no (or minimal) intervention on my part. I understand VTAM and TCP/IP have
to be set up, that is all done.
Rich Smrci
ok, I understand and agree, I am kind of lucky, I was asked to have z/osmf
available on 2.2 IIRC for the policy agent so all the security is now setup, if
you are a Top-Secret site like me, it was quite an adventure.
Carmen Vitullo
-Original Message-
From: Rich
To: IBM-MAI
>Does the custom pac for 2.5 still provide the Installing your order doc? since
>if 2.5 requires z/osmf then there is an assumption on IBM's part that security
>had already been setup and you are already using z/osmf
>
>
>
>Carmen Vitullo
if you order V2.5 before January 1, you can have
shifing 1 byte to the left
removing the phase and mode
changing the number of rld entries in the last rld record from x'34' to x'10
no complains from the binder
the skipped rld entries contain x'0100' and one just zeros.
no idea what that means, i have never seen vse
On 07/10/2021 10:00
W dniu 23.09.2021 o 22:21, Ward, Mike S pisze:
Hello, all. I don't know if any of you are doing disk replication to a DR site,
but we are, and we are trying to resolve a specific problem with CICS and VSAM
file.
CICS, in the case of LSR pools hold the data in the buffers until a buffer
shorta
Looks like you probably have a RACF issue due to this:
CWWKB0118W: This server is not authorized to connect to the IZUANG1
Look for ICH408I messages.
Also, we found we needed UJ05022 on z/OS 2.4 to use the software install
process for z/OS 2.5.
Check your maint levels if you want to install 2.5.
K
It looks like you punched with stacker select, which suggests that the record
length is 81 rather than 80. IAC, I suspect that there is VSE only code there.
Is there a decompiler?
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Main
Kev,
I’m referring to the customized offering driver. If it’s intent is to allow a
customer to install z/OS using zOSMF, it should be set up to do so. That
includes all of the security bits.
Rich Smrcina
> On Oct 7, 2021, at 12:31 PM, Senior, Kevin
> <03d27faeee8d-dmarc-requ...@listserv.
Everyone,
First in full disclosure I work for Dell Technologies Mainframe
Practice, now that is out of the way I will proceed.
Dell Technologies does off a Cyber Protection solution for the
Mainframe using our PowerMax hardware and Software for DASD and our DLm
Solut
Rich
You’re right, it *should* have the necessary fixes.
Also, you're right it *should* have the necessary security set up for the
IZUSVR1 to connect to the IZUANG1, but the message you're getting suggests
IZUSVR1 is not authorised to connect to IZUANG1 so something isn't right with
the security
And assuming you never make a mistake. Never leave an APF data set unprotected.
Never give the wrong person console authority. Fully understand APF on UNIX.
Never have a Rexx PDS used by privileged users that is modifiable by others.
Have no magic SVCs. Have no flawed APF code, no APF "tools" av
You’d have to be a poorly run shop to permit any of those to occur. Maybe
that’s why mainframe hacks have actually never happened.Biden successfully
extracted 124,000 from Afghanistan in a few weeks. Amazing.
Sent from Yahoo Mail for iPhone
On Thursday, October 7, 2021, 2:12 PM, Charles M
I don't know, but what the professional Pen Testers tell me is that they never
fail to find things like that.
I've never met any group that never made a mistake, never had an "oops," never
"missed something."
Magic SVCs were widespread until recently. Has every single one vanished?
Charles
-
> Maybe that’s why mainframe hacks have actually never happened
Assuming you don't count Logica. ("Oh, that wasn't a real mainframe hack, they
came in through USS.")
And assuming you don't count one other that I am aware of but under a firm
request not to discuss.
Charles
-Original Messa
On Thu, 7 Oct 2021 15:47:11 -0700, Charles Mills wrote:
>I don't know, but what the professional Pen Testers tell me is that they never
>fail to find things like that.
>
Do you mean they always find one or they always find all?
On Thu, 7 Oct 2021 15:49:17 -0700, Charles Mills wrote:
>> Maybe
Logica isn’t actually a hack. And of course the phantom one you’re working on.
Sent from Yahoo Mail for iPhone
On Thursday, October 7, 2021, 4:49 PM, Charles Mills wrote:
> Maybe that’s why mainframe hacks have actually never happened
Assuming you don't count Logica. ("Oh, that wasn't a rea
Nearly all banks run a mainframe. If hackers wanted to break into platforms
handling the worlds financial system, where all the money is, the mainframe is
the platform. The MF has been around for 60-70 years and all you can come up
with the Logica non hack and some hokey hack only you know about
The one I am privately aware of I did not work on and is four years (?) in the
past. It was a US government system.
There are varying versions of the Logica story. The one I read in the police
report and accept as factual involved the exploitation of a flaw in a Web
browser running on z/OS UNIX
Interesting thought. Has anyone ever tested for a buffer overrun exploit in USS
(the old USS, the real USS)?
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Paul Gilmartin
Sent: Thursday, October 7, 2021 3:59 PM
To: IBM-MAIN
Right, they’re all kept under wraps in a world where privacy is next to
impossible. And what you heard (suddenly not under wraps) isn’t what happened
with Logica.
If your kid drops his key, and someone uses it to enter a house, that’s not a
break in.
60-70 years and all you’ve got is a few non
The insecurity of Windows is irrelevant. The insecurity of less-secure
platforms is relevant to the question "where should I implement my financial
software?" but not relevant to the question "do I need to consider the
possibility of a mainframe breach?"
By the same logic, no bank has ever been
> your hatred of IBM and the mainframe
My friend, now you are out there. I have 53 years on this platform, and it has
been very, very good to me.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Bill Johnson
Sent: Thursday,
Security is paramount in the 15 or so shops I’ve worked in. And supremely
important in banks. And none were ever hacked. IBM makes it easy to secure the
MF. Other platforms make it easy for hackers. Banks are robbed fairly often.
Just through the front door. Many of you are anti mainframe. It sh
Started when you were 12 or still needing to work into your 70’s?
Sent from Yahoo Mail for iPhone
On Thursday, October 7, 2021, 5:32 PM, Charles Mills wrote:
> your hatred of IBM and the mainframe
My friend, now you are out there. I have 53 years on this platform, and it has
been very, very
I'll repeat what I always say about this. If I was hacking a mainframe
I wouldn't start with the mainframe, I'd start with the sysprog or
security admin's PC or Mac or email or phone or whatever. In that case
it doesn't matter one bit how well the mainframe is protected internally.
And pleas
I’d like to see anyone hack a mainframe using my phone. Or email. Let me guess.
Mills and you sell security?
Sent from Yahoo Mail for iPhone
On Thursday, October 7, 2021, 5:50 PM, Tom Brennan
wrote:
I'll repeat what I always say about this. If I was hacking a mainframe
I wouldn't start wi
I did not start when I was 12 and I do not need (financially) to work. I love
coding and I like this platform.
I have been very involved with security solutions for the mainframe. I do not
currently exactly sell mainframe security. I recently did a presentation on how
certificates work. Is that
Exactly, and "that was not a real hack" would not get your data back.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Tom Brennan
Sent: Thursday, October 7, 2021 4:50 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe ran
The thing about you list dominators, is you think you know it all and should
never be challenged. I love when the IBM experts corrects one of you.
Sent from Yahoo Mail for iPhone
On Thursday, October 7, 2021, 6:01 PM, Charles Mills wrote:
Exactly, and "that was not a real hack" would not get
Obviously not you, but I've seen email and phone used for apps that
allow sysprogs temporary upgraded access, validated only by their email
address or phone text.
On 10/7/2021 4:53 PM, Bill Johnson wrote:
I’d like to see anyone hack a mainframe using my phone. Or email. Let me guess.
Mills an
Attila,
I agree with you that there is almost no chance of a load module
generated from this object deck operating correctly.
z/OS and VSE use SVCs differently. For performing I/O, DCBs and DTFs
are radically different. The VSE COBOL compiler may be
calling library routines that don't exi
I don't know about the others on the list, but I am a tad tired of this and
other rounds of sniping between Mr. Johnson and Mr. Mills.
I would sincerely appreciate it if both of you would tone it down by an order
of magnitude or more, or even better take this particular line of discussion
offli
Agreed. Move on.
Rich Smrcina
> On Oct 7, 2021, at 7:34 PM, Farley, Peter x23353
> <031df298a9da-dmarc-requ...@listserv.ua.edu> wrote:
>
> I don't know about the others on the list, but I am a tad tired of this and
> other rounds of sniping between Mr. Johnson and Mr. Mills.
>
> I would
Don't expect it to work. When VSE punches a phase, the link deck created
includes any called modules without any way to get them out. This is in
contrast to z/OS which produces all the individual modules.
Tony Thigpen
Gadi Ben-Avi wrote on 10/7/21 3:22 AM:
Hi,
I was asked to attempt to link a
(Sorry, another repeat here) I once test-called the company Help Desk
and with no other information but the fact that I called from a
sysprog's desk phone (my own), they gave me not only a password reset,
but also told me my TSO userid because I had "forgotten" it, and then
helped me log on. S
Ok... sorry. I retract my last post :)
Oops... the internet is forever.
On 10/7/2021 5:34 PM, Farley, Peter x23353 wrote:
I don't know about the others on the list, but I am a tad tired of this and
other rounds of sniping between Mr. Johnson and Mr. Mills.
I would sincerely appreciate it if b
I tried the @VSE2PDF address. It's possible we could use the services of your
data center.
> Tony Thigpen
Dave Gibney
gib...@wsu.edu
509-335-7359
Information Technology Services
Washington State University
--
For IBM-MAIN subsc
Sincere apologies. I was trying to be constructive.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Farley, Peter x23353
Sent: Thursday, October 7, 2021 5:34 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe ransomware s
Philip Young
“Soldier of Fortran”
Mainframe hacker videos from 6 years ago :-(
https://youtu.be/Xfl4spvM5DI
https://youtu.be/vyHAqxCkf-k
There are other Def con etc mainframe hacker
videos out there ...
Kinda makes me nervous...
---
>From the information security perspective there's a well-known
confidentiality, integrity and availability (CIA) triad.
However, the overall security posture of an organisation is dependent on
the following three key areas: people, process, technology (PPT).
Majority of breaches/risks can be prev
56 matches
Mail list logo