On 29 Nov 2010 08:43:23 -0800, in bit.listserv.ibm-main you wrote:

>I would tend to agree with ' they violate our standards and are sharing ids'. 
>Security is not priority one in some other countries. (At least not OUR 
>security).

Security is not that high a priority in many organizations where the
mantra is get the job done whatever it takes.  If the security
department is too restrictive and viewed as being a major roadblock,
the other departments will get creative.

If you have a product that insists on special characters in passwords,
this can be a major pain given the variability of code points for many
of the characters.  Also how many passwords do you have to remember?  

Clark Morris
>
>-----Original Message-----
>From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of 
>McKown, John
>Sent: Monday, November 29, 2010 10:58 AM
>To: [email protected]
>Subject: Re: A New Threat for password hacking
>
>Each to his own. I prefer "the human touch" on password resets. But I'm an old 
>paranoid <grin>. In my arrogance, somebody who cannot remember their RACF 
>password likely can't remember their own name, either. A passphrase may be 
>more difficult. But 8 stupid characters, max? Sure, it could be forgotten 
>early on. And after a vacation. But we've had literally 8 or 10 password reset 
>requests in a row from some of our off-shore users. Personally, I think they 
>violate our standards and are sharing ids. But I can't prove it.
>
>John McKown 
>
>Systems Engineer IV
>
>IT
>
> 
>
>Administrative Services Group
>
> 
>
>HealthMarkets(r)
>
> 
>
>9151 Boulevard 26 * N. Richland Hills * TX 76010
>
>(817) 255-3225 phone * 
>
>[email protected] * www.HealthMarkets.com
>
> 
>
>Confidentiality Notice: This e-mail message may contain confidential or 
>proprietary information. If you are not the intended recipient, please contact 
>the sender by reply e-mail and destroy all copies of the original message. 
>HealthMarkets(r) is the brand name for products underwritten and issued by the 
>insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
>Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
>MEGA Life and Health Insurance Company.SM
>
> 
>
>> -----Original Message-----
>> From: IBM Mainframe Discussion List
>> [mailto:[email protected]] On Behalf Of Paul Gilmartin
>> Sent: Monday, November 29, 2010 9:44 AM
>> To: [email protected]
>> Subject: Re: A New Threat for password hacking
>> 
>> On Mon, 29 Nov 2010 05:27:56 -0600, John McKown wrote:
>> >
>> >What gets me on this is that, in the recent past, some people at work 
>> >were wanting an "automatic resume" of any RACF id which got too many 
>> >password violations after some interval - like 10 minutes. So try "n"
>> >times, wait "m" minutes, rinse and repeat. Luckily this was killed.
>> >
>> The proposal isn't totally unreasonable in that it multiplies the time 
>> required for a brute force attack by a few orders of magnitude.
>> I knew a product which imposed an escalating lockout time before retry 
>> for each unsuccessful attempt.
>> 
>> -- gil
>> 

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to