Perhaps one of the RACF folks can comment on what I am about to say.... 

I thought that there was a change to allow RACF to be able to extract the 
password now.  (which would allow RACF to play better with LDAP 
repositories etc etc)

Although if you:
* have the db
* know the location of the password(s)
* have a known ID on the system

Then you might stand a better chance of reversing your way out of the 
encrypted value. 

Letting your security database out would generally come under the "big no 
no" category.  Which I understand is the key to the claim of the 
Penetration Testing Manager.

But if you take simple steps like keeping people from read access to your 
database.. seems like such an easy prevention step.. oh and things like 
keep APF authorization down to a controlled level.

We do exist on a platform with good controls.. however it does require 
that we use them.

Rob Schramm
Sirius Computer Solutions

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to