Re: [SPAM] Hmc for z as a virtual appliance?

2019-02-01 Thread Costin Enache
Having explored the topic in the past, I believe you need to talk to IBM. The platform and code for the HMC and SE systems is under tight control and nobody but IBM can provide you with access to the thing. IBM customers are not allowed to do that. And event if/when you get the thing, it will no

Debug SVC

2012-07-20 Thread Costin Enache
Hi, Please assist a poor soul into finding a way to debug SVC (supervisor call interrupt) handlers. I am still learning HLASM and debugging stuff on 390, so I am not really aware of the tools, hooks, methods and concepts available. So far I have managed to get ASMIDF running nicely, relinked with A

Re: Debug SVC (and pretty much anything else with z/XDC)

2012-07-20 Thread Costin Enache
Dave, I guess I will give it a try. I see you offer trial installs, so I will get in touch privately. Do you have any pointers in the existing online documentation as to see how the exact hooking into system SVCs can be performed with z/XDC ? Thanks Costin F

Re: Debug SVC

2012-07-21 Thread Costin Enache
> There is a major difference between the SVC interrupt handler and an > interrupt routine. You really don't want to mess with the former at > all, and you shouldn't mess with the latter until you understand the > SVC types and have some experience writing privileged code. Mea culpa :) I was refe

Re: RACF Database protection

2013-09-03 Thread Costin Enache
a short key. IBM has tried to sort of adapt the CBC mode to this scenario, but did not word out very well. Costin On 3 Sep 2013, at 16:42, Paul Gilmartin wrote: > On Tue, 3 Sep 2013 14:41:49 +0100, Costin Enache wrote: >> >>> The password phrase hash can be split into bloc

Re: RACF Database protection

2013-09-04 Thread Costin Enache
, 4 September 2013, 1:11 Subject: Re: RACF Database protection On 3 September 2013 09:41, Costin Enache wrote: > The phrase clear text is already padded with spaces to a multiple of 8, but, > after encryption, the resulting hash is truncated to the length of the > original clear text,

Re: RACF Database protection

2013-09-05 Thread Costin Enache
F Database protection On 4 September 2013 04:07, Costin Enache wrote: > It may not be APARable. Even if you fix the bug, what do you do with the old > password phrases? Maybe update the RACF database with a secure hash value > once the user logs in (to add the previously discarded hash bytes)

Re: RACF Database protection

2013-09-09 Thread Costin Enache
Are you sure? Could you please specify exactly where too look in the RACF docs? Or do you mean the ICHDEX01 exit (for which you can either choose masking or implement - program - your own algorithm)? Costin From: Elardus Engelbrecht To: IBM-MAIN@LISTSERV.UA.

Re: Rather interesting article on "hacking the mainframe" using ftp

2013-05-20 Thread Costin Enache
Embarrassing that some actually consider that a security flaw. Except for the title, that article does not mention any security flaws or any other problems related to the host. The article describes some evident functionality - how to solve a technical challenge by FTP + JCL. To consider this a bac

Re: RACF Database protection

2013-09-01 Thread Costin Enache
Small clarification: The usage of password phrases instead of passwords does not increase the complexity of a brute-force attack against the encrypted hashes, in case the RACF DB gets compromised (flawed / insecure DES implementation). The time required for recovering a 16-byte password phrase is t

Re: RACF Database protection

2013-09-02 Thread Costin Enache
nal Message- :>: From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On :>: Behalf Of Costin Enache :>: Sent: Sunday, September 01, 2013 12:04 PM :>: To: IBM-MAIN@LISTSERV.UA.EDU :>: Subject: Re: RACF Database protection :>: :>: Small :>: clarification:

Re: RACF Database protection

2013-09-03 Thread Costin Enache
From: Paul Gilmartin To: IBM-MAIN@LISTSERV.UA.EDU Sent: Monday, 2 September 2013, 22:09 Subject: Re: RACF Database protection >>The password phrase hash can be split into blocks of 8 bytes, and each of >>them "cracked" independently, also in parallel. >>

Re: Mainframe's security assessments costs

2016-08-23 Thread Costin Enache
Hi, Some topics that we had to address when performing mainframe security assessments: Why you need the assessment for? If you need it for some certification / legal purpose, then there are cheap, not too technically advanced solutions out there. If you are actually looking into detecting and