Don,

For Brute Force cracking our thief may need a lot of leisure time. I have a
Password Protected Word document from 7 years ago that I forgot the password
on. Occasionally I start up a brute force cracker to open this file as I'd
like to have the contents back.

Over the last 5 years I've accumulated nearly six months of 'crack time' on
some pretty fast desktops, and I'm not even half way there. 

Ron

> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Don Leahy
> Sent: Friday, 16 February 2007 8:59 AM
> To: [email protected]
> Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
> 
> It is pretty obvious that weak passwords greatly increase the likelihood
> that a brute force attack will work.
> 
> However, since most (all?) systems revoke userids after a very small
> number
> of unsuccessful password attempts, the issue of strong vs weak passwords
> is
> totally irrelevant to your end users, so why burden them with strict
> password policies?   Even a weak password will stand up to a brute force
> attack if the userid is revoked after 3 failures.
> 
> Protecting the password data base from theft is the security
> administrator's
> job, not the end user's.  It doesn't matter how strong the safe or how
> complex the combination, if the thief can tuck it under his arm and take
> it
> home with him to work on at his leisure.
> 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to