Hello Shalom, 

I am not sure what release of BPCS you last managed as you didn't
mention it in your note, nor if you have been following the many
discussions on BPCS-L for these security related issues over the past
few years? If you check the archives there are much more detailed
discussions that can explain the below even further.

At any rate the situation you describe has certainly changed for clients
who are on support or remained current on BPCS releases. 

Problem A can be resolved in any currently supported release of BPCS
(BPCS CD - V6.1) by implementing BMR 51582 (or equivalent BMR, depending
on BPCS release) and is delivered in base release of V8.x releases by
following the installation instructions Appendix regarding implementing
increased security. This uses *OWNER adopted authority and iSeries
object security to ensure the user doesn't have that authority to CALL a
program or use files they are not authorized to and alters the command
line and ATTN key programs to ensure the user operates under his own
authority when at the command line.

Problem B is in fact resolved in V6.1 and higher releases, regardless of
the user's authority to the object. It can be easily resolved in other
releases if you have the source for that program, by adding a call to
SYS610B to check the user's authority to run SYS600D before launching
the first screen.

Problem C same resolution as problem A and since BPCS data files are
part of the iSeries database, the iSeries security is what must be used
to lock it down when access is attempted from outside the BPCS product
as you describe.

Problem D same resolution as problem A, same issue as issue C.

Problem E can be resolved by journaling as stated or using products
designed for high availability such as Mimix.


Genyphyr Novak
Senior System Software Engineer
SSA Global R&D

-----Original Message-----

date: 17 Apr 2005 13:31:07 -0000
from: shalom@xxxxxxxxxx
subject: [BPCS-L] Re: BPCS - Program Security

I would like to point out several problems with BPCS security. 
As I have not managed a BPCS environment during the last 4 years, 
maybe some problems were resolved in the new versions, although I doubt

a. A user that has command line can activate any program by CALLing
   For example, you can block ACP100 (vendor maintenance) in BPCS
   but a user can simply CALL ACP100C from a command line. 

b. A user that has command line can CALL SYS600C and modify 
   the BPCS security definitions.

c. A user that has FTP, or ODBC, or File transfer access, 
   can retrieve and modify BPCS files at will. 
   BPCS does not manage separate system level object authorities 
   for sensitive files.

d. In particular, A user that has FTP, or ODBC, or File transfer access,
   can modify the BPCS security files, 
   granting unplanned application authorities.

e. BPCS does not use commitment control and has 
   no vendor defined journaling policy. This affects both your 
   security if you chose to implement journaling on your own, 
   and your disaster recovery plans.

Fortunately, the solutions are not very complicated:

Step 1
Remove command line access from users who do not need it.

Step 2
Fully audit the powerful users who have command line 

Step 3
Change the default object authority to modify the sensitive files, 
and allow data modification only to those who need it.
This will not work for files like IIM!!

Step 4
To protect files like IIM either create a database journal and audit it 
for unapproved changes, or add auditing database triggers.

Step 5
If FTP, or ODBC, or file transfer are used on your AS/400, 
buy a commercial security product to manage authorization to these

Step 6
If you are concerned with disaster recovery, define database journaling 
for all of the BPCS files. The performance penalty is negligible, 
but storage must be managed carefully.

Shalom Carmel
www.venera.com - exposing AS/400 insecurity

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.