On Mon, 2010-11-29 at 04:39 -0600, Brian Westerman wrote:
> It's kind of difficult to use a brute force attack when RACF revokes the ID
> after a site specified number of attempts.  Assuming the site doesn't allow
> 1 or 2 character passwords (you don't do you), even if the site were to
> allow 100 attempts, it's statistically a REALLY long shot to guess the
> password.  I would imagine that most sites have 3 or 4 as the number of
> attempts, making the probability for success of a brute force attack too
> remote to consider as they wouldn't even get out of the single character
> attempts.  
> 
> Brian
> 

I was thinking more of an off-line attack by having captured some sort
of dump of the database. 

What gets me on this is that, in the recent past, some people at work
were wanting an "automatic resume" of any RACF id which got too many
password violations after some interval - like 10 minutes. So try "n"
times, wait "m" minutes, rinse and repeat. Luckily this was killed. They
also want a "Web like" interface so that a person could reset their own
password via their browser. Luckily, we were able to kill most of this
stuff with HIPAA requirements. And the "dangling of multi-million dollar
penalities" should this be used to crack our system.

-- 
John McKown
Maranatha! <><

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to