On Sun, 20 Feb 2022 14:10:06 -0500, Phil Smith III  wrote:
>
>    ...  there
>is a theology in security that you err on the side of less detail about a
>security failure, to prevent attackers from gaining information that might
>help them in their quest. This is why, for example, it's considered better
>to say "Login failed" than "No such userid".
>
Has z/OS embraced that "theology" recently?  I argued for it in these pages
many years ago and received a rousing chorus of "That would just make it
harder to analyze logon failures!"  I regarded it as "NIH" when I had argued
based on my familiarity with non-IBM systems.

"We simply disable the ID after N failures."

"But that's an exposure to DoS attacks."
    ...
A clash of cultures.

I once dealt with a port that was disabled after too many failures simply by
connecting to a different port.  The design may have worked for hardwired
terminals in secured areas.  I reported my circumvention to admins.  They
recognized the locking as an ineffective nuisance and turned it off.

-- 
gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to