On Tue, 27 Mar 2012 11:09:23 -0700, Skip Robinson wrote:

>The reason I brought up this 'vulnerability' is that we hired a consultant
>a while back to look for weaknesses. Of course they were able to logon
>with a vanilla userid that had no special authority. And this is what they
>did.
>
>We all spend a lot of time and mental energy focused on how to protect
>ourselves from sophisticated attack. We look at APF. We look at SVC
>screening. We look at access to sensitive libraries. But this particular
>'denial of service' can be accomplished by anyone with a valid userid and
>password. And *only* because we lock up users for invalid password
>attempts. I'm just sayin'...
> 
Would you and the auditors feel better if users logged on without
typing passwords, via SSH with certificates stored on their desktops?

Does SSH/SSL lock accounts on detected intrusion?

There is an SSL flavor of tn3270, isn't there?  And that would
encrypt even LAN traffic.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to