Rick Fochtman wrote:
--------------------<snip>-----------------
I still don't see how anyone can hack a userid and password and log on to a RACF protected system. If you have security set up correctly, you only get 3 tries or so, and then the ID is revoked.
-------------------<unsnip>-----------------
You would be STUNNED at the number of shops that don't think of something that simple. I could have named three large banking-related institutions here in Greater Chicago that never thought of it until I pointed it out to them. (Business-related discussions, when I was still working.)

Let me ask this question - although this is not directly related to RACF - but to any access control system that locks out people upon failed access attempts..

Isn't locking out or revoking someone because of unsuccessful access attempts a wonderful denial of service attack opportunity ?

You wait for your good friend in the next cubicle to go on a coffee break.. log him off (it he hasn't already done so) - and attempt to log in with bogus passwords 3 times.. and while you are at it, do the same for some other userids of some highly ranked officers from HIS terminal.. There is going to be some embarrassment for a LOT of people and a lot of time lost.. (your co-worker, the locked out people, the person responsible for security)..

I am of course not saying anyone should do that.. But isn't it a potential problem with user name lockouts ?

--Ivan

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to