The Magic SVC is still at large, along with functionally analogous
abominations such as:o The Prodigal PC Routine.o The Munificent MC Function.o
The Front-ended (Program) FLIH.
These are all harder to discover than a back-door authorization SVC, but all
can be found with the right tools and/or an SVC Dump.I guess they’re also
listed in order of implementation complexity and overal pervasiveness with
regard to the operating system.
Finding a hiding place for back door functions is getting harder to the point
where some developers are actually considering planning for security before
coding begins.
Keven
On Sat, Aug 8, 2020 at 12:28 PM -0500, "Paul Gilmartin"
<[email protected]> wrote:
On 2020-08-08, at 11:20:25, Robert Netzlof wrote:
>
> But do remember that in Ye Gude Auld Days, there was a widely known
> "magic" SVC which granted authorization to the user.
>
"Widely known"? But wasn't it always site-specific, never
distributed by IBM in a base system? Likewise Installation
manuals always urged changing the password for IBMUSER.
> On 8/8/20, Doug Wegscheid wrote:
>> Site-specific SVC to do so?
>>
>> On Saturday, August 8, 2020, 12:11:14 PM EDT,robin51 wrote:
>>
>> Padegs says that "none of our operating systems were [sic] programmed
>> to turn in the [ASCII] bit".
>>
>> So, no-one was able to use the ASCII facility.
-- gil