Ted MacNEIL wrote:
If you have no password rules, most people will pick
a simple word. If you require at least one digit, most people will put it at the beginning or end. Both are easy prey to
dictionary attacks.

FUD!
Pick a minimum length.
Allow anything and an "N"-Strikes rule.

The dictionary attack dies after "N" attempts.

It is good to distinguish some terms.
Dictionary attack is repetitivie trying to logon using some dictionary as password database. Brute force is trying all possible passwords, sometimes (usually?) brute force is OPTIMIZED to small subset of all possible attack, usually it is based on some dictionary plus some additions, like numeric at the end, etc.

Both methods are unusable for RACF with N-strikes rule. I't much more likely to win Lotto than to find the password within N strikes.

However there's also password guessing, social engineering etc. People tend to use their family names, dog name etc. In such case hacker have to learn about the user to try the password. However implementation of simple rule like ALPHANUM make this method unusable.

The other attack could rely on "password iteration": My current password is JOHN01, the next will be JOHN02, etc. In such case *some insider* can watch the keyboard, find part of the password (or all at once) and then try once a day to find missing characters. This is quite dangerous, because once you get the password, you will know or easily try each next. The only method to prevent it in RACF is security exit which deny usage of password "too similar" to old one. This rule is not very popular.

BTW: Bruce Schneier's opinion on writing passwords cannot be treated as recommendation for internal company systems. He rather meant many sites on the web, etc. Many systems, unrelated on to each other, many rules, sometimes very hard to user. Application like password safe are good for this case. However it shouldn't be understood like recommendation for company systems. Better one is single sign on product.

So, for RACF (mainframe) I would vote for:
RULE1(LENGTH(4:8) ALPHANUM(1:8)))
HISTORY(32)
REVOKE(5)
INTERVAL(60)
WARNING(3)
MINCHANGE(1)
MIXEDCASE if all applications support it.

and some exit which prevent usage of userid as a part of the password, and new password similar to old one.

Of course, it is good to create and maintain list of "forbidden words" like all postal codes and car registration numbers of all employees <vbg>

--
Radoslaw Skorupka
Lodz, Poland

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to