That's true password cracking can be complex. However, if you have a copy
of the database you can find who are the users that have admin authority
and concentrate cracking their passwords.



ITschak

בתאריך יום ו׳, 10 במאי 2019, 17:49, מאת Mark Jacobs ‏<
00000224d287a4b1-dmarc-requ...@listserv.ua.edu>:

> Yes;
>
> The KDFAES algorithm is used to encrypt passwords and password phrases,
> but not OIDCARD data. It is designed to be resistant to offline attacks by
> incorporating the following properties:
>
> Each instance of a RACF® password injects randomly generated text into the
> encryption process. This prevents the use of pre-computed password hashes.
> That is, an offline attack must perform the full encryption process for
> every password guess, as opposed to simply comparing the password hash
> against a list of pre-computed values. This slows down the attack, making
> it take much longer to guess passwords.
>
> Thousands of hash operations are performed against the password and random
> text in order to generate a key which is then used to encrypt the user ID.
> This also serves to slow down an offline attack, which must perform the
> same number of operations for each password guess. However, the authorized
> user logging on to the system using his clear text password will not notice
> the increased overhead.
>
>
> Sent from ProtonMail, Swiss-based encrypted email.
>
> GPG Public Key -
> https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com
>
> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Friday, May 10, 2019 10:34 AM, Dana Mitchell <mitchd...@gmail.com>
> wrote:
>
> > On Fri, 10 May 2019 00:24:18 -0400, Bob Bridges robhbrid...@gmail.com
> wrote:
> >
> > > The lesson I take from this, and pass on to
> > > my clients, is that read access to the security database is a huge
> exposure
> > > and in most cases - that is, for most user IDs - completely
> unnecessary.
> >
> > Doesn't the KDFAES password encryption algorithm make itmuch more
> difficult to crack passwords, given access to the RACF database? I realize
> nothing is impossible to crack.. but at least not currently feasible with
> current available hardware.
> >
> > Dana
> >
> >
> -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> >
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to