The Magic SVC is still at large, along with functionally analogous 
abominations such as:o  The Prodigal PC Routine.o  The Munificent MC Function.o 
 The Front-ended (Program) FLIH.
These are all harder to discover than a back-door authorization SVC, but all 
can be found with the right tools and/or an SVC Dump.I guess they’re also 
listed in order of implementation complexity and overal pervasiveness with 
regard to the operating system.
Finding a hiding place for back door functions is getting harder to the point 
where some developers are actually considering planning for security before 
coding begins.
Keven

        
        

        
    
  




On Sat, Aug 8, 2020 at 12:28 PM -0500, "Paul Gilmartin" 
<[email protected]> wrote:










On 2020-08-08, at 11:20:25, Robert Netzlof wrote:
> 
> But do remember that in Ye Gude Auld Days, there was a widely known
> "magic" SVC which granted authorization to the user.
>  
"Widely known"?  But wasn't it always site-specific, never
distributed by IBM in a base system?  Likewise Installation
manuals always urged changing the password for IBMUSER.

> On 8/8/20, Doug Wegscheid wrote:
>> Site-specific SVC to do so?
>> 
>>    On Saturday, August 8, 2020, 12:11:14 PM EDT,robin51 wrote:
>> 
>> Padegs says that "none of our operating systems were [sic] programmed
>> to turn in the [ASCII] bit".
>> 
>> So, no-one was able to use the ASCII facility.

-- gil

Reply via email to