Hi Bob,
Thank you for your feedback. You are right about that. However, at the
time, those that decide on policy decided that only non-expiring passwords
needed to be converted. The active userids would be converted at password
expire time.


Regards
Jack

On Mon, Apr 28, 2025, 11:56 Robert S. Hansel <r.han...@rshconsulting.com>
wrote:

> Jack,
>
> The drawback to that approach is all the pre-existing passwords in the
> database - current, history, and non-expiring - are still in DES encrypted
> format and remain at risk to a brute force password cracking attack. In all
> the KDFAES implementation projects we've done, we have used ALTUSER
> PWCONVERT to immediately convert all passwords to KDFAES encryption. This
> does not, however, convert password phrases. The fallback is to activate
> the IRRUT200 backup that should have been take immediately prior to this
> event, which we've never had to do.
>
> Regards, Bob
>
> Robert S. Hansel
> Lead RACF Specialist
> RSH Consulting, Inc.
> 617-969-8211
> www.linkedin.com/in/roberthansel
> www.rshconsulting.com
>
> -----Original Message-----
> Date:    Sun, 27 Apr 2025 22:34:54 +0100
> From:    Jack Zukt <jzuk...@gmail.com>
> Subject: Re: Enabling the KDFAES encryption algorithm for the RACF Database
>
> Hi
> We have implemented it for a while now. Activated KDFAES with SETR command
> and password expiration did the rest.
>
> Regards
> Jack
>
> On Fri, Apr 25, 2025, 20:12 Jasi Grewal <
> 0000040674ae00fc-dmarc-requ...@listserv.ua.edu> wrote:
>
> > Greetings,
> >
> >
> > We are planning to migrate to the KDFAES encryption algorithm for the
> RACF
> > database and would like to know if you have followed a similar process.
> > Please review the steps below and confirm if our assumptions are correct
> > regarding the migration to KDFAES standards, or if we are missing any
> steps:
> >
> >    -
> > Request all teams to initiate the SMPE Fix Category using the following,
> > and apply it to their respective products such as DB2, IMS, and CICS:
> > IBM.Function.RACF.PasswordEncryption
> >
> >    -
> > Request application programmers to verify their application programs for
> > any RACROUTE statements using TYPE=ENCRYPT or TYPE=EXTRACT.
> >
> >    -
> > Review RACF exits, especially ICHDEX01.
> >
> >    -
> > Enable the CPACF HMC feature.
> >
> >    -
> > Make a copy of your current RACF database.
> >
> >    -
> > Activate this copy on a test system.
> >
> >    -
> > On the test system, activate KDFAES with the command:
> > SETR PASSWORD(ALGORITHM(KDFAES))
> >
> >    -
> > If we experience issues, deactivate it using:
> > SETR PASSWORD(NOALGORITHM)
> >
> >
> > Concern:
> > We would like to better understand the impact of the following IBM
> > recommendation and explore ways to minimize disruption:
> >
> > “Perform a bulk password change, notifying users of their pending new
> > password.”Additionally, please ensure the following actions are taken:
> >
> >
> >    -
> > Activate KDFAES on the test system.
> >
> >    -
> > Remove ICHDEX01 if it is currently installed in your system.
> >
> >
> > Looking forward to your feedback and confirmation.
> > Thank You in advance,Best regards,Jasi Grewal.
> >
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to