Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Anne & Lynn Wheeler

[EMAIL PROTECTED] (Thompson, Steve) writes:

You mean, should your computer (laptop) be stolen, one could then boot
using a LIVE Linux CD, and crack the wallet contents... Come to think of
it, with a LIVE Linux CD, one can crack NTFS files used by Windows

This is why in our pursuit of security, we make ourselves unsecure
because of all the accounts we have that we have to have a userid and
password for. And if kept in that wallet, once it is hacked, what damage
could be done?

Think about this for a moment. How many web sites require you to
register before you can look at their content. This adds to the issue.

How many use the same throw-away userid across as many junk
sites/accounts as possible, but keep the same password as they use for
their banking ids? While I may have said this backwards, I think you can
see the point.

Again, I do not have a solution because the things that I would have
pointed out or pointed to have already been shown to not be so secure
after all by others on IBM-Main.


previous post in thread:
http://www.garlic.com/~lynn/2007d.html#34 Mixed Case Password on z/OS 1.7 and 
ACF 2 Version 8

so the issue discussed in these recent posts
http://www.galric.com/~lynn/aadsm26.htm#35 Failure of PKI in messaging
http://www.garlic.com/~lynn/aadsm26.htm#36 New Credit Cards May Leak Personal 
Information

is to transition away from shared-secret paradigm
http://www.garlic.com/~lynn/subintegrity.html#shared

an issue with (static data) shared-secret paradigm is that the same
value is used to both originate/authenticate as well as to verify.
this also leads to requirement that each unique security domain
requires unique shared-secret as countermeasure to cross-domain
attacks.

in public key paradigm, the value to originate an authentication is
different than the value to verify an authentication. also the value
being verified can be made unique for every use ... as countermeasure
to evesdropping and replay attacks.

the private key can be made sufficiently complex that it effectively
negates bute-force guessing attacks.

so threat/attack vector then starts focusing on (unauthorized)
accessing (possibly single) private key.

for some drift, archeological ('81) reference to public key proposal
http://www.garlic.com/~lynn/2006w.html#email810515 more secure communication 
over the network

and old ('84) april 1st "corporate directive" password guideline proposal
http://www.garlic.com/~lynn/2001d.html#52 OT Re: A beautiful morning in AFM.
http://www.garlic.com/~lynn/2001d.html#53 April Fools Day

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Password rules including my disdain for mixed case was Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Clark Morris
On Fri, 16 Feb 2007 10:31:35 -0700, in bit.listserv.ibm-main you
wrote:

>On 16 Feb 2007 09:05:19 -0800, [EMAIL PROTECTED] (Rick Fochtman)
>wrote:
>
>>That's true, Walt. But how do you prevent the user from burying his id, 
>>or an anagram of it, in the password without using an exit? We found 
>>that to be the most prevalent security-related issue when we had to 
>>grant acces to non-DP oriented users, like the traders on the floor at 
>>the Chicago Board of Trade.
>>
>>(Forcing regular password changes was a whole other issue. )
>
>Let me see, this is February of 2007, my password must be B02razee07.
As someone who is keeping straight a large number of passwords (2
email, 2 financial, 1 for the place I sometimes contract for, 3 home
passwords, one of which is written down, 1 weak password for yahoo, a
password for the LAN when on a contract and a password for the
mainframes), I have several rules.  I will use special characters that
seem invariant across code pages if allowed such as period slash and
comma.  My minimum password is 7 characters and it will have letters
and numbers.  I won't use upper case unless forced and will send memos
stating why this is a BAD idea.  I have enough problems typing and
remembering to put up with trying to remember when to shift and don't
need typing complications.  Unless I believe that I have compromised a
password, I won't change it unless forced to because I believe that it
is an exercise in futility designed to pacify security administrators.
If someone has stolen the password database, there are worse problems
than my not changing a password.  If there is a keystroke logger on my
computer, frequent changes won't matter (note that at home I run 2
spyware checkers with online checking and an Internet Security suite
that worried about Quicktax doing keystroke monitoring).  While like a
paranoid systems programmer, I don't automatically update Windows, I
do so periodically and read the notes for the updates which seem as
good as many of those I have seen for APARs.  It is ironic that the
only special characters allowed in things like user-ids are three that
in EBCDIC are not stable across code pages.  If someone wants to make
the password stronger, give me the stable special characters and
longer passwords.  One of my financial passwords exceeds 8 characters
but not all institutions will accept a longer password.  Note that a
fingerprint should be easy to capture and forge.  The better biometric
might be an audible voice q&a.  
 
>Gets me past the password cops, I don't write my password down, and
>can do my work.
>
>Hey, it can be broken - but if I don't work, I don't get paid -
>security is someone else's problem.
>
>Years ago I had a Vax class - my instructor was French, so she was
>able to use passwords that the English language password parser did
>not recognize as words.
>
>But just as security isn't my job - developing a useable replacement
>for passwords apparently isn't the job of our local security staff -
>not without a budget and support to do something better.
>
>And apparently nobody is solving the problem of world-wide security
>with people using the same password on a hundred web sites (meaning
>that they can be phished).The occasional article telling them this
>is dangerous does nothing - if they read it, they can't remember a
>hundred different secure passwords.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of McKown, John
Sent: Friday, February 16, 2007 1:01 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

> -Original Message-
> From: IBM Mainframe Discussion List 
> [mailto:[EMAIL PROTECTED] On Behalf Of Thompson, Steve
> Sent: Friday, February 16, 2007 12:48 PM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8



> 
> We are becoming unsecure by trying to be so secure. Not everyone has
> photographic memory so that they can remember all their 
> userid/password
> combinations (where they can write it down, look at it, then 
> destroy the
> paper).
> 
> This is why PDAs are becoming dangerous as are laptops with their
> "wallets" and the like where people keep their userids and 
> passwords in
> their browsers.
> 
> I do not have the answer(s), I just started thinking about the simple
> solutions that people will use, but allow risk of compromise being
> increased.
> 
> Later,
> Steve Thompson

One thing that can be done with the Konqueror web browser and KDE on
Linux is to use "KDE Wallet". This is an encrypted file which contains
various userids and passwords. Konqueror (and other software) can
interface with the "KDE Wallet". The program asks for the wallet's
password and pass it to the interface along with the resource whose
password is needed. The wallet then gives the appropriate password back
to the application. This may have been what you were talking about with
"wallets", but I'm not sure.



You mean, should your computer (laptop) be stolen, one could then boot
using a LIVE Linux CD, and crack the wallet contents... Come to think of
it, with a LIVE Linux CD, one can crack NTFS files used by Windows

This is why in our pursuit of security, we make ourselves unsecure
because of all the accounts we have that we have to have a userid and
password for. And if kept in that wallet, once it is hacked, what damage
could be done?

Think about this for a moment. How many web sites require you to
register before you can look at their content. This adds to the issue.

How many use the same throw-away userid across as many junk
sites/accounts as possible, but keep the same password as they use for
their banking ids? While I may have said this backwards, I think you can
see the point.

Again, I do not have a solution because the things that I would have
pointed out or pointed to have already been shown to not be so secure
after all by others on IBM-Main.

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Howard Brazee
On 16 Feb 2007 11:01:44 -0800, [EMAIL PROTECTED] (McKown,
John) wrote:

>One thing that can be done with the Konqueror web browser and KDE on
>Linux is to use "KDE Wallet". This is an encrypted file which contains
>various userids and passwords. Konqueror (and other software) can
>interface with the "KDE Wallet". The program asks for the wallet's
>password and pass it to the interface along with the resource whose
>password is needed. The wallet then gives the appropriate password back
>to the application. This may have been what you were talking about with
>"wallets", but I'm not sure.
>
>This is somewhat better than writing it down, but only works for
>programs which can interface with "KDE Wallet".

If we can carry this "wallet" from computer to computer, then this
could be an acceptable solution.   But if we lose this wallet, we lose
our passwords.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread McKown, John
> -Original Message-
> From: IBM Mainframe Discussion List 
> [mailto:[EMAIL PROTECTED] On Behalf Of Thompson, Steve
> Sent: Friday, February 16, 2007 12:48 PM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8



> 
> We are becoming unsecure by trying to be so secure. Not everyone has
> photographic memory so that they can remember all their 
> userid/password
> combinations (where they can write it down, look at it, then 
> destroy the
> paper).
> 
> This is why PDAs are becoming dangerous as are laptops with their
> "wallets" and the like where people keep their userids and 
> passwords in
> their browsers.
> 
> I do not have the answer(s), I just started thinking about the simple
> solutions that people will use, but allow risk of compromise being
> increased.
> 
> Later,
> Steve Thompson

One thing that can be done with the Konqueror web browser and KDE on
Linux is to use "KDE Wallet". This is an encrypted file which contains
various userids and passwords. Konqueror (and other software) can
interface with the "KDE Wallet". The program asks for the wallet's
password and pass it to the interface along with the resource whose
password is needed. The wallet then gives the appropriate password back
to the application. This may have been what you were talking about with
"wallets", but I'm not sure.

This is somewhat better than writing it down, but only works for
programs which can interface with "KDE Wallet".

At cutesy overview is at:

http://www.marcelgagne.com/cwl012005.html

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

The information contained in this e-mail message may be privileged
and/or confidential.  It is for intended addressee(s) only.  If you are
not the intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is
strictly prohibited and could, in certain circumstances, be a criminal
offense.  If you have received this e-mail in error, please notify the
sender by reply and delete this message without copying or disclosing
it. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Brazee
Sent: Friday, February 16, 2007 11:32 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8



But just as security isn't my job - developing a useable replacement
for passwords apparently isn't the job of our local security staff -
not without a budget and support to do something better.

And apparently nobody is solving the problem of world-wide security
with people using the same password on a hundred web sites (meaning
that they can be phished).The occasional article telling them this
is dangerous does nothing - if they read it, they can't remember a
hundred different secure passwords.



Kind of what I was driving at when I said something about all the
accounts that I have to have a user id and password for. Banks, clubs,
employers (and how many systems have their own password/userid and
associated rules?), etc.

We are becoming unsecure by trying to be so secure. Not everyone has
photographic memory so that they can remember all their userid/password
combinations (where they can write it down, look at it, then destroy the
paper).

This is why PDAs are becoming dangerous as are laptops with their
"wallets" and the like where people keep their userids and passwords in
their browsers.

I do not have the answer(s), I just started thinking about the simple
solutions that people will use, but allow risk of compromise being
increased.

Later,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Howard Brazee
On 16 Feb 2007 09:05:19 -0800, [EMAIL PROTECTED] (Rick Fochtman)
wrote:

>That's true, Walt. But how do you prevent the user from burying his id, 
>or an anagram of it, in the password without using an exit? We found 
>that to be the most prevalent security-related issue when we had to 
>grant acces to non-DP oriented users, like the traders on the floor at 
>the Chicago Board of Trade.
>
>(Forcing regular password changes was a whole other issue. )

Let me see, this is February of 2007, my password must be B02razee07.

Gets me past the password cops, I don't write my password down, and
can do my work.

Hey, it can be broken - but if I don't work, I don't get paid -
security is someone else's problem.

Years ago I had a Vax class - my instructor was French, so she was
able to use passwords that the English language password parser did
not recognize as words.

But just as security isn't my job - developing a useable replacement
for passwords apparently isn't the job of our local security staff -
not without a budget and support to do something better.

And apparently nobody is solving the problem of world-wide security
with people using the same password on a hundred web sites (meaning
that they can be phished).The occasional article telling them this
is dangerous does nothing - if they read it, they can't remember a
hundred different secure passwords.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Rick Fochtman

---
Good points.  Note, however, that there's a difference between requiring 
mixed-case passwords and having overly strict password rules.  A rule 
requiring 8-character passwords, with at least one upper case alpha, one 
lower case alpha, and one numeric is not overly strict, and can be met 
easily by the users.


That's true, Walt. But how do you prevent the user from burying his id, 
or an anagram of it, in the password without using an exit? We found 
that to be the most prevalent security-related issue when we had to 
grant acces to non-DP oriented users, like the traders on the floor at 
the Chicago Board of Trade.


(Forcing regular password changes was a whole other issue. )

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-16 Thread Walter Farrell

On 2/15/2007 7:59 PM, Don Leahy wrote:
It is pretty obvious that weak passwords greatly increase the likelihood 
that a brute force attack will work.


However, since most (all?) systems revoke userids after a very small 
number of unsuccessful password attempts, the issue of strong vs weak 
passwords is totally irrelevant to your end users, so why burden them 
with strict password policies?   Even a weak password will stand up to a 
brute force attack if the userid is revoked after 3 failures.


Protecting the password data base from theft is the security 
administrator's job, not the end user's.  It doesn't matter how strong 
the safe or how complex the combination, if the thief can tuck it under 
his arm and take it home with him to work on at his leisure.


Good points.  Note, however, that there's a difference between requiring 
mixed-case passwords and having overly strict password rules.  A rule 
requiring 8-character passwords, with at least one upper case alpha, one 
lower case alpha, and one numeric is not overly strict, and can be met 
easily by the users.


Walt Farrell, CISSP
z/OS Security Design, IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-15 Thread Ron Hawkins
Don,

For Brute Force cracking our thief may need a lot of leisure time. I have a
Password Protected Word document from 7 years ago that I forgot the password
on. Occasionally I start up a brute force cracker to open this file as I'd
like to have the contents back.

Over the last 5 years I've accumulated nearly six months of 'crack time' on
some pretty fast desktops, and I'm not even half way there. 

Ron

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Don Leahy
> Sent: Friday, 16 February 2007 8:59 AM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
> 
> It is pretty obvious that weak passwords greatly increase the likelihood
> that a brute force attack will work.
> 
> However, since most (all?) systems revoke userids after a very small
> number
> of unsuccessful password attempts, the issue of strong vs weak passwords
> is
> totally irrelevant to your end users, so why burden them with strict
> password policies?   Even a weak password will stand up to a brute force
> attack if the userid is revoked after 3 failures.
> 
> Protecting the password data base from theft is the security
> administrator's
> job, not the end user's.  It doesn't matter how strong the safe or how
> complex the combination, if the thief can tuck it under his arm and take
> it
> home with him to work on at his leisure.
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-15 Thread Don Leahy
It is pretty obvious that weak passwords greatly increase the likelihood 
that a brute force attack will work.


However, since most (all?) systems revoke userids after a very small number 
of unsuccessful password attempts, the issue of strong vs weak passwords is 
totally irrelevant to your end users, so why burden them with strict 
password policies?   Even a weak password will stand up to a brute force 
attack if the userid is revoked after 3 failures.


Protecting the password data base from theft is the security administrator's 
job, not the end user's.  It doesn't matter how strong the safe or how 
complex the combination, if the thief can tuck it under his arm and take it 
home with him to work on at his leisure.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-15 Thread Peter Goldis
Walt is right (as usual) about the advantages of mixed-case passwords in 
deterring brute-force attacks. To get a feel for the difference, take a 
look at http://www.goldisconsulting.com/predict.htm
 
Mixed case passwords are also effective in deterring "dictionary" attacks. 
In our consulting and pen-testing work, we often run cracking tools in both 
ACF2 and RACF shops with a standard dictionary, and typically get "hits" on 
15-25% of the userids. Testing several thousand ids for all the words in 
the list can take a few hours. Having to test for mixed-case passwords 
makes this attack a lot less useful. 

Here are some lists we typically use (see your password?): 
http://www.goldisconsulting.com/dictionaries.htm

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ted MacNEIL
>Sooner or later, the criminally-inclined will find a steal-around.


Let's all go home.
Let's all dig a hole in our back-yard.
Let's all put food, clothing, hygenic material, and favourite entertainment 
material in there (free, otherwise they have our contact info).
Let's then pull the dirt over us.
Then, we are protected from the 'criminally-inclined'.

Or, we can live/enjoy our lives and realise there is a risk to everything we do.

Yes, there may/will be a steal-around, but as with anything else, we can work 
with what we have and improve as improvements come.

PS: how did describing crooks and crooked activity become politically correct?
Criminally-inclined? Steal-around?
I mean, REALLY!

Crooks and theft?

(8-{>}

Nyuk! Nyuk! Nyuk!

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Gray, Larry - Larry A
NOTICE:
All information in and attached to the e-mail(s) below may be proprietary, 
confidential, privileged and otherwise protected from improper or erroneous 
disclosure.  If you are not the sender's intended recipient, you are not 
authorized to intercept, read, print, retain, copy, forward, or disseminate 
this message.  If you have erroneously received this communication, please 
notify the sender immediately by phone (704-758-1000) or by e-mail and destroy 
all copies of this message (electronic, paper, or otherwise).  Thank you.

I saw that episode.  Both of the main people using different methods
were able to defeat the fingerprint based lock once they obtained the
fingerprint of the person that programmed the lock.

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Hal Merritt
Sent: Wednesday, February 14, 2007 1:46 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

Doesn't anyone watch the Discovery Channel show Mythbusters? There was
one episode where they defeated a fingerprint based lock. 

They did not disclose the details on how they accomplished one critical
step, but, hey, we know it can be done. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Anne & Lynn Wheeler

Howard Brazee wrote:

As with all security needs, the technology will need to improve to
match the moving target of criminals.   We don't know far behind the
8-ball our credit cards technologies or our currency technologies are
- but we trust them enough so they work for our current needs.   I
suspect we are more vulnerable than we would like to admit here.

We know passwords are failing though.And the primary reason is we
need too many passwords all over the place - security needs to work
the way people work.


collection of posts over the past year about deployment of hardware tokens in 
that market segment ... and some of the related vulnerabilities and exploits
http://www.garlic.com/~lynn/subintegrity.html#yescard

recent thread in crypto list
http://www.garlic.com/~lynn/aadsm26.htm#32 Failure of PKI in messaging
http://www.garlic.com/~lynn/aadsm26.htm#33 Failure of PKI in messaging
http://www.garlic.com/~lynn/aadsm26.htm#34 Failure of PKI in messaging

and somewhat related thread that preceeded it
http://www.garlic.com/~lynn/aadsm26.htm#26 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#27 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#28 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#30 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#31 man in the middle, SSL

as repeatedly mentioned in the above ... (SSL) encryption involved "hiding" the 
account number while it moved thru the internet ... for what came to be called electronic 
commerce.

in the mid-90s, the x9a10 financial standard working group had been given the 
requirement to preserve the integrity of the financial infrastructure for all 
retail payments. this resulted in the x9.59 financial standard
http://www.garlic.com/~lynn/x959.html#x959
http://www.garlic.com/~lynn/subpubkey.html#x959

if you look at the security PAIN acronym

P - privacy (or somethings CAIN for confidentiality, i.e. security by hiding 
information)
A - authentication
I - integrity
N - non-repudiation

in effect, x9.59 financial standard substituted "authentication" and "integrity" for 
"privacy". part of this was the diametrically opposing requirements placed on account numbers. at 
one end, the requirement to keep account numbers confidential and never allowed to be divulged. at the other 
end, dozens of business processes that require ready and general access to the account number. this led to my 
periodic comment that even if the planet was buried under miles of (information hiding) encryption, it still 
wouldn't be able to prevent account number leakage.

now, part of the password paradigm analysis is from the standpoint of 3-factor 
authentication:
http://www.garlic.com/~lynn/subintegrity.html#3factor

* something you know (i.e. pins and passwords)
* something you have (i.e. hardware tokens)
* something you are (i.e. biometrics)

pins and passwords ... have commoningly been deployed as "shared secrets". This 
has resulted in a security requirement for a unique shared secret for every unique 
security domain (as countermeasure to cross domain attacks). Other security requirements 
have required passwords to be impossible to guess (as countermeasure to  guessing 
attacks) ... which also tends to have the side-effect that they are impossible to 
remember.

40-50 years ago, when a person was possibly involved in only a single security domain ... and only 
had a single password to remember ... the password ("shared-secret" "something you 
know") paradigm was somewhat tolerable. However, as typical number of unique security domain 
participation by individuals has grown to scores ... the scores of related passwords have become 
unmanageable.
http://www.garlic.com/~lynn/subintegrity.html#secrets

now, one of the assumptions in the domain of "multi-factor" authentication ... 
is the security is better based on (frequently implicit) assumption that the different 
factors are subject to independent vulnerabilities. however, there are a number of 
technology attacks that can invalidate such a assumption ... being able to compromise 
multi-factor authentication in a single exploit.

For instance, in the previously mentioned "yes card" exploit, there is an assumption about multi-factor authentication 
... with a chip-token as a "something you have" authentication in conjunction with a PIN as "something you 
know". However, part of the "yes card" exploit is being able to counterfeit the "YES" in response to 
query whether the correct PIN was entered
(i.e. "YES" is the response regardless of what PIN is entered, negating any 
requirement for actually needing to know the correct PIN).
http://www.garlic.com/~lynn/subintegrity.html#yescard

and a recent somewhat long running general thread
http://www.garlic.com/~lynn/2007.html#0 Securing financial transactions a high 
priority for 2007
http://www.garlic.com/~lynn/2007.html#5 Securing financial transactions a high 
priority for 2007
http://www.garlic.com/~lynn/2007.html

Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Kirk Talman
And if your token is used with a laptop for remote access, don't store the 
token in the laptop case, even in your own house.

IBM Mainframe Discussion List  wrote on 02/14/2007 
11:08:34 AM:

> Same goes for those tokens. Those are wonderful gadgets and offer a
> strong solution. But just how many do we expect the average user to
> carry? Two? Ten? The solution does not look to scale well. 


-
The information contained in this communication (including any
attachments hereto) is confidential and is intended solely for the
personal and confidential use of the individual or entity to whom
it is addressed. The information may also constitute a legally
privileged confidential communication. If the reader of this
message is not the intended recipient or an agent responsible for
delivering it to the intended recipient, you are hereby notified
that you have received this communication in error and that any
review, dissemination, copying, or unauthorized use of this
information, or the taking of any action in reliance on the
contents of this information is strictly prohibited. If you have
received this communication in error, please notify us immediately
by e-mail, and delete the original message. Thank you

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Rick Fochtman


Doesn't anyone watch the Discovery Channel show Mythbusters? There was 
one episode where they defeated a fingerprint based lock.


They did not disclose the details on how they accomplished one critical 
step, but, hey, we know it can be done.

--
Let's face it; no matter what security we devise, it will only serve to 
keep honest people out. Sooner or later, the criminally-inclined will 
find a steal-around.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Hal Merritt
Doesn't anyone watch the Discovery Channel show Mythbusters? There was
one episode where they defeated a fingerprint based lock. 

They did not disclose the details on how they accomplished one critical
step, but, hey, we know it can be done. 


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Paul Gilmartin
Sent: Wednesday, February 14, 2007 11:14 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

In a recent note, Howard Brazee said:
  
Isn't it merely a matter of time, though, before the technology
arises to spoof fingerprint readers?  Then we'll need to be
concerned not only that a dishonest waiter copies our credit
cards, but that a dishonest busboy lifts our fingerprints from
the water glasses.  Fingerprints don't impress me as a good
secret.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL
 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ed Finnell
 
In a message dated 2/14/2007 12:11:50 P.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

uh, Ed...  ???




>>
Just trying to reduce the back pressure on the manifolds. Search  
jcwhitney

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Rick Fochtman

Ed Finnell wrote:



In a message dated 2/14/2007 8:44:43 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:


That  would go over like "exhaust pipe resonance" in an  elevator.



 


Shoot, we got fixes for everything
_http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CAT
ENTRY_ID:2012155/p-2012155/N-111+10201+600015810/c-10101_ 
(http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CATENTRY_ID:2012155/p-2
012155/N-111+10201+600015810/c-10101) 
 


uh, Ed... ???

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Howard Brazee
On 14 Feb 2007 09:14:34 -0800, [EMAIL PROTECTED] (Paul Gilmartin)
wrote:

>Isn't it merely a matter of time, though, before the technology
>arises to spoof fingerprint readers?  Then we'll need to be
>concerned not only that a dishonest waiter copies our credit
>cards, but that a dishonest busboy lifts our fingerprints from
>the water glasses.  Fingerprints don't impress me as a good
>secret.

As with all security needs, the technology will need to improve to
match the moving target of criminals.   We don't know far behind the
8-ball our credit cards technologies or our currency technologies are
- but we trust them enough so they work for our current needs.   I
suspect we are more vulnerable than we would like to admit here.

We know passwords are failing though.And the primary reason is we
need too many passwords all over the place - security needs to work
the way people work.

A couple or a few decades ago I read a SF story - the protagonist
appeared to be a criminal and one thing he did was pull the
fingerprint off a rich person to make a bunch of luxury purchases. It
turns out he worked for the good guys, and was testing the system for
a bet.At the end of the story, he made another bet for 6 months in
the future - after his co-workers changed the technology for such
things as making sure that the fingerprint came from a conscious
person.   In that world, such crime appeared to be rare - but the
process made sense anyway.   (I tend to believe that Vernor Vinge's
example of the danger of ubiquitous law enforcement is more likely to
be true).

What direction do we need to go for logon security? 

The problem of counterfeiting is also a problem that extends beyond
paper money - counterfeiting data can effect us all over.   Google
recently added software to counter Google Bombs ("miserable failure").
It's not hard to extrapolate this concept to all Information
Processing.  

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Paul Gilmartin
In a recent note, Howard Brazee said:

> Date: Wed, 14 Feb 2007 09:34:55 -0700
> 
> Individual shops can (but don't) spend the money for fingerprint
> readers - I'm not sure if that solution would work universally (if
> Microsoft, Apple, and Red Hat included standard ID software in their
> operating systems).
> 
Isn't it merely a matter of time, though, before the technology
arises to spoof fingerprint readers?  Then we'll need to be
concerned not only that a dishonest waiter copies our credit
cards, but that a dishonest busboy lifts our fingerprints from
the water glasses.  Fingerprints don't impress me as a good
secret.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ted MacNEIL
>immediate termination.

With or without prejudice?

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Howard Brazee
On 14 Feb 2007 06:31:32 -0800, [EMAIL PROTECTED] (McKown, John)
wrote:

>> I think he is - but it might be more secure than in shops that require
>> passwords that are so strong that people don't remember them, but
>> write them down on yellow post notes.
>
>This is easy to stop. Restrict distribution and use of yellow
>post-it(tm) note paper. 
>
>"Use of post-it note paper will be considered a security violation and
>subject to disciplinary action up to and including immediate
>termination."

LOL!

Trouble is, that's almost as bad as what is actually happening.

Individual shops can (but don't) spend the money for fingerprint
readers - I'm not sure if that solution would work universally (if
Microsoft, Apple, and Red Hat included standard ID software in their
operating systems).

It could be that everybody's waiting for someone else to solve the
problem for the Net instead of fixing their in-shop problem now.   The
payback time for getting fingerprint readers isn't that large for
those with desktop computers.And if they are combined with good
cryptology, the security advantage for laptops is tremendous.

VPN software companies should be offering integration now.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Paul Gilmartin
In a recent note, Walter Farrell said:

> Date: Tue, 13 Feb 2007 12:57:00 -0500
> 
> You're right, though, that all the applications that are passing the
> password along need to know to leave it as the user entered it.  That
> makes migrating to mixed-case passwords harder than it would have been
> if we'd made the security product do the upper-casing of the input many
> years ago.
> 
A similar principle should have been applied to data set and member
name transformation and enforcement -- this should have been done
in a single common component at a low layer.  If the intent of the
Data Management design was to have a mixed case file system, all
names should be taken as-is.  If the intent was to have a single-case
file system, any attempted use of the other case should result
in a syntax error.  If the intent was to have a case-insensitive
file system, a low level component should perform the translation.

Alas, Conway's law took its pernicious toll.  The design groups
didn't communicate and did not form a common objective.  In
consequence, allocation assumes mixed-case and takes names as-is.
JCL and Catalog assume single-case and treat most uses of lower
case as syntax errors.  And TSO et. al. assume case-insensitive
and convert to upper before calling lower level layers.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ed Finnell
 
In a message dated 2/14/2007 8:44:43 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

That  would go over like "exhaust pipe resonance" in an  elevator.



>>
Shoot, we got fixes for everything
_http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CAT
ENTRY_ID:2012155/p-2012155/N-111+10201+600015810/c-10101_ 
(http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CATENTRY_ID:2012155/p-2
012155/N-111+10201+600015810/c-10101) 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Hal Merritt
(Soap box deployed) 

You can make such policies, but folks will find ways to cope. We point a
fire hose of passwords to manage at the poor user. 

I argue it is best to attack a root problem rather than try to pile on
fix after fix. 

In response to Walt's wise words: yes the *individual* password may be
technically stronger, but we have to consider the larger picture. It is
one thing if that were the *only* password the user had to manage, but
quite another if the user has to fumble with many. 

Same goes for those tokens. Those are wonderful gadgets and offer a
strong solution. But just how many do we expect the average user to
carry? Two? Ten? The solution does not look to scale well. 

(Soap box secured)  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of McKown, John
Sent: Wednesday, February 14, 2007 8:31 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
 
> I think he is - but it might be more secure than in shops that require
> passwords that are so strong that people don't remember them, but
> write them down on yellow post notes.

This is easy to stop. Restrict distribution and use of yellow
post-it(tm) note paper. 

"Use of post-it note paper will be considered a security violation and
subject to disciplinary action up to and including immediate
termination."

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology
 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Walter Farrell

On 2/13/2007 1:49 PM, [EMAIL PROTECTED] wrote:

I believe that allowing mixed-case does increase security, as it makes
the number of possible passwords of any given length much greater, and
increases the amount of time needed for brute-force password guessing.


How can you do a brute-force password guess when you have a max of 3
password attempts before the ID is revoked?

Or are you saying that mixed-case increases security in those rare
shops that haven't implemented revoking IDs on wrong passwords?




Revocation based on number of invalid attempts should (for the most 
part) prevent attacks from people actually trying to login.  It does not 
stop attacks from people who have acquired a copy of your database, and 
can thus see the encrypted data in the password fields.


Given the encrypted authentication data, and the user ID, the brute 
force attack would involve examining all possible passwords until you 
find one that generates that same encrypted data.


With mixed-case that brute force process needs to cover more possible 
passwords, and thus will take longer, on average.  You have a possible 
password space (for 8-character passwords) of 65**8 rather than 39**8.


Walt Farrell, CISSP
z/OS Security Design, IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Chase, John
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of McKown, John
> 
> > -Original Message-
> > From: IBM Mainframe Discussion List On Behalf Of Howard Brazee
> > 
> > On 13 Feb 2007 10:49:55 -0800, pauls2272 wrote:
> > 
> > >Or are you saying that mixed-case increases security in those rare 
> > >shops that haven't implemented revoking IDs on wrong passwords?
> > 
> > I think he is - but it might be more secure than in shops that
require 
> > passwords that are so strong that people don't remember them, but 
> > write them down on yellow post notes.
> 
> This is easy to stop. Restrict distribution and use of yellow
> post-it(tm) note paper. 
> 
> "Use of post-it note paper will be considered a security 
> violation and subject to disciplinary action up to and 
> including immediate termination."

That would go over like "exhaust pipe resonance" in an elevator.

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread McKown, John
> -Original Message-
> From: IBM Mainframe Discussion List 
> [mailto:[EMAIL PROTECTED] On Behalf Of Howard Brazee
> Sent: Tuesday, February 13, 2007 1:11 PM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
> 
> 
> On 13 Feb 2007 10:49:55 -0800, [EMAIL PROTECTED] wrote:
> 
> >Or are you saying that mixed-case increases security in those rare
> >shops that haven't implemented revoking IDs on wrong passwords?
> 
> I think he is - but it might be more secure than in shops that require
> passwords that are so strong that people don't remember them, but
> write them down on yellow post notes.

This is easy to stop. Restrict distribution and use of yellow
post-it(tm) note paper. 

"Use of post-it note paper will be considered a security violation and
subject to disciplinary action up to and including immediate
termination."

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

The information contained in this e-mail message may be privileged
and/or confidential.  It is for intended addressee(s) only.  If you are
not the intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is
strictly prohibited and could, in certain circumstances, be a criminal
offense.  If you have received this e-mail in error, please notify the
sender by reply and delete this message without copying or disclosing
it. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-13 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Brazee
Sent: Tuesday, February 13, 2007 1:11 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

On 13 Feb 2007 10:49:55 -0800, [EMAIL PROTECTED] wrote:

>Or are you saying that mixed-case increases security in those rare
>shops that haven't implemented revoking IDs on wrong passwords?

I think he is - but it might be more secure than in shops that require
passwords that are so strong that people don't remember them, but
write them down on yellow post notes.



Let's see, one bank I deal with has one requirement for uid/password.
Then the other bank says that the uid is one they assign, and the
password must be 8+ chars... Let's not forget the ATM cards

OK, now the _ club I'm a member of requires an assigned uid with a
password that must be at least 4 characters, no repeats, can't be part
of my ssn,...

On my own LAN I have UID and PSWD requirements, plus the WiFI keys, plus
uid/pswd for each router, plus the admin/root and passwords for each
workstation/laptop ...

Then the library has a login that requires knowing the number on the
card plus a pwd that is

My employer has 12 systems that I have to login to (not including my
desktop system or their laptop), each with a different pwd expiration
period, with memory that prevents re-use for at least 18 times, password
can only be changed once a day...

My ISPs all have requirements for email and hosted web sites

Then there are my voice mail accounts (home & work), plus cell phones...

So since I have all these requirements, which do not match, I have to
write them down w/ the pswds (history) if I have any hope of actually
accomplishing anything beyond talking to the various help desks all day.

It would seem that some auditor somewhere would take one look at the
REAL world people live and work in and start to recognize that the whole
thing becomes insecure when it is not possible to remember all this
stuff.

And the RSA key idea is just as complicated, when someone has to have 4
of those suckers, has to remember which one belong to which system...

Me thinks by working at becoming secure, we have become non-secure
because of how important a PDA becomes to keep it all straight.

Mixed case RACF/ACF2 only adds to the problems (and I won't get into the
programatical issues).

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-13 Thread Howard Brazee
On 13 Feb 2007 10:49:55 -0800, [EMAIL PROTECTED] wrote:

>Or are you saying that mixed-case increases security in those rare
>shops that haven't implemented revoking IDs on wrong passwords?

I think he is - but it might be more secure than in shops that require
passwords that are so strong that people don't remember them, but
write them down on yellow post notes.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-13 Thread Walter Farrell

On 2/13/2007 12:30 PM, Hal Merritt wrote:

Other than there is not one shred of evidence to suggest this makes for
stronger security? And ample experiences of increased help desk calls
that actually lead to weakened security? And complex passwords generate
sticky notes? 


Mixed-case does not necessarily mean the password will seem more complex 
to the user.  That kind of complexity is really a function of the rules 
that the security administrator tries to impose.  If you tell me I can 
use mixed-case, but do not restrict where I put the characters, then I 
can, for example, use two words with initial or trailing caps, and other 
letters lower-case.  That is then more complex for a brute-force 
password cracker, but no more complex for me as a user.




Only auditors think that this adds value. Those with actual knowledge
think otherwise.  


I believe that allowing mixed-case does increase security, as it makes 
the number of possible passwords of any given length much greater, and 
increases the amount of time needed for brute-force password guessing.


However, whether you have mixed-case or not, the administrator can 
compromise security by making the password rules too restrictive.




But wait. There is more. Not all applications that actually interact
with the keyboard will get this right. Some might pass the password as
is, but some may translate it to upper case first. And then there are
the character translation issues.  


The character translation issues should not apply; we're only talking 
mixed-case A-Z, a-z, not allowing additional characters with variant 
mappings depending on code page.


You're right, though, that all the applications that are passing the 
password along need to know to leave it as the user entered it.  That 
makes migrating to mixed-case passwords harder than it would have been 
if we'd made the security product do the upper-casing of the input many 
years ago.


Walt Farrell, CISSP
z/OS Security Design, IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-13 Thread Hal Merritt
Other than there is not one shred of evidence to suggest this makes for
stronger security? And ample experiences of increased help desk calls
that actually lead to weakened security? And complex passwords generate
sticky notes? 

Only auditors think that this adds value. Those with actual knowledge
think otherwise.  

But wait. There is more. Not all applications that actually interact
with the keyboard will get this right. Some might pass the password as
is, but some may translate it to upper case first. And then there are
the character translation issues.  

Let Occam's razor be your guide :-)

HTH and good luck. 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of JONES, CHARLIE
Sent: Monday, February 12, 2007 10:45 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

Are there any known pitfalls in using mixed-case passwords on z/OS 1.7
and ACF 2 Version 8?

Is anyone even using the mixed case feature that could share their
experiences with us?

Charlie

 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html