I of course defer to Walt. Fervent ignorance is to be eschewed even when 
it's fired in the right general direction. In this case, password per se 
is not stored, but 'something is stored' that could be stumbled upon by a 
deftly written program running at very high speed forever. 

Userids are easily discernible. We run standard RACF utilities to 
determine for example what profiles a userid owns in order to prepare for 
deleting that userid. So userids don't have to be guessed at. They're 
visible in the (purloined) data base. One then 'merely' has to affix a 
random password string, then crunch the zeroes and ones to find a match in 
the copied data base. Certainly longer strings like password phrases will 
take longer to match. But hackers have nothing but time.

As my pal Leonard Woren once said: If you build a better mousetrap, the 
world will build a better mouse. 

.
.
JO.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
626-302-7535 Office
323-715-0595 Mobile
jo.skip.robin...@sce.com



From:   Walt Farrell <walt.farr...@gmail.com>
To:     IBM-MAIN@LISTSERV.UA.EDU, 
Date:   08/17/2013 10:54 AM
Subject:        Re: RACF Database protection
Sent by:        IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU>



On Sat, 17 Aug 2013 10:30:57 -0700, Skip Robinson 
<jo.skip.robin...@sce.com> wrote:

>This exposure has been known--and discussed publicly--for several years.
>It is NOT true that 'passwords are not stored'. If they weren't 'stored'
>at all, then how could RACF validate the password you supply? They are in
>fact stored in encrypted form. The encryption method itself is not a 
state
>secret. It can be simulated.

Sorry, Skip, but that's wrong. The passwords are, in fact, not stored at 
all. (There is one exception, the "password enveloping" function, but 
that's a different discussion than this one.)

RACF encrypts the user ID using the password as the key, and stores the 
encrypted user ID. The password itself is not saved, in any form.

>
>The brute force method alluded to here starts with a copy of a RACF data
>base. Then generated character strings are fed into an encryption program
>until the encrypted form of some random string matches what's found in 
the
>data base for a given userid. Voila. The password has been hacked.

No, it's not the "encrypted form of some random string", it's the 
encrypted form of the user ID, when using some random string as the 
encryption key.

>
>Once upon a time, it would have taken so long to perform this string 
match
>that passwords would likely have changed in the meantime. Nowadays
>computers all the way down to smart phones have gotten faster while the
>encryption algorithms have remained the same. There is to my knowledge no
>canonical defense for this hacking method. Best you can do is to prevent
>the data base from being copied in the first place.

Where possible, you can switch to the use of password phrases rather than 
passwords. You're right that the brute fore attacks are increasingly 
simple for mere 8-byte passwords, but password phrases give you longer 
values (minimum 14 by default, though you can decrease that to 9 with an 
exit) that will be harder. And with commonly available technology it's 
perhaps impossible today if you have only a slightly longer string. 

-- 
Walt



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to