76 lines
4.7 KiB
HTML
76 lines
4.7 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="task" />
|
||
|
<meta name="DC.Title" content="Modify architected transaction program names" />
|
||
|
<meta name="abstract" content="Learn the techniques used to prevent architected transaction program names from running on the system." />
|
||
|
<meta name="description" content="Learn the techniques used to prevent architected transaction program names from running on the system." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvdevelopintrusiondetectstrat.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvarchitecttpn.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="architectmodify" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>Modify architected transaction program names</title>
|
||
|
</head>
|
||
|
<body id="architectmodify"><a name="architectmodify"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">Modify architected transaction program names</h1>
|
||
|
<div><p>Learn the techniques used to prevent architected transaction program
|
||
|
names from running on the system.</p>
|
||
|
<div class="p">Some communications requests send a specific type of signal to your
|
||
|
system. This request is called an <span class="uicontrol">architecture transaction program
|
||
|
name</span> (TPN) because the name of the transaction program is part
|
||
|
of the APPC architecture for the system. A request for display station pass-through
|
||
|
request is an example of an architecture TPN. Architecture TPNs are a normal
|
||
|
way for communications to function and do not necessarily represent a security
|
||
|
exposure. However, architecture TPNs might provide an unexpected entrance
|
||
|
into your system. <p>Some TPNs do not pass a profile on the request. If the
|
||
|
request becomes associated with a communications entry whose default user
|
||
|
is *SYS, the request may be initiated on your system. However, the *SYS profile
|
||
|
can run system functions only, not user applications.</p>
|
||
|
<p>If you do not
|
||
|
want architecture TPNs to run with a default profile, you can change the default
|
||
|
user from *SYS to *NONE in communications entries. </p>
|
||
|
</div>
|
||
|
<div class="section">If you do not want a specific TPN to run on your system at all, perform
|
||
|
the following steps:</div>
|
||
|
<ol><li class="stepexpand" id="architectmodify__step1cl"><a name="architectmodify__step1cl"><!-- --></a><span>Create a CL program that accepts several parameters.
|
||
|
The program should perform no function. It should simply have the Declare
|
||
|
(DCL) statements for parameters and then end.</span></li>
|
||
|
<li class="stepexpand"><span>Add a routing entry for the TPN to each subsystem that has communications
|
||
|
entries or remote location name entries. The routing entry should specify
|
||
|
the following:</span> <ul><li>A Compare value (CMPVAL) value equal to the program name for the TPN with
|
||
|
a starting position of 37.</li>
|
||
|
<li>A Program to call (PGM) value equal to the name of the program that you
|
||
|
created in step <a href="#architectmodify__step1cl">1</a>. This prevents
|
||
|
the TPN from locating another routing entry, such as *ANY.</li>
|
||
|
</ul>
|
||
|
</li>
|
||
|
</ol>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzamvarchitecttpn.htm">Architecture TPN requests</a></strong><br />
|
||
|
This article lists the architecture transaction program names and their associated user profiles.</li>
|
||
|
</ul>
|
||
|
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvdevelopintrusiondetectstrat.htm" title="The following information is a collection of tips to help you detect potential security exposures.">Prevent and detect security exposures</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|