SlideShare a Scribd company logo
© 2012 IBM Corporation
IBM Security Systems
1© 2013 IBM Corporation
A new leap forward …
in RACF password security
Luigi Perrone
Technical Pre-Sales System Engineer
IBM Security Systems
luigi_perrone@it.ibm.com
© 2013 IBM Corporation
IBM Security Systems
2
 password length
 password quality
 encryption strength
 password DB access control
 policy controls
 user education
Elements of password security
What are the more important characteristics for password security ?
All of these aspects should be considered together to provide a
multi-layered and interdependent set of defenses
© 2013 IBM Corporation
IBM Security Systems
3
General guidelines
 Short password change interval
…..to minimize the chance that a password can be cracked during its lifecycle
 Good password history
…..to keep users from reusing the same password. In this mode an attacker does not essentially
have the sufficient time to crack it !
 Real strong encryption
…..to force the use of time and resources in a brute-force attack.
Some interesting suggestions
...are they implemented ?
© 2013 IBM Corporation
IBM Security Systems
4
 Effective access control of the password database
…..to ensures that nobody can start an offline attack against encrypted passwords
 Invalid password revoke count policy
…..to prevents repeated guesses against a user's password
 Revoke count low
.....if all history vales were cracked the changes of guessing which one might be the
current password would be reduced
 User education
…..for example don’t use the same password in RACF and in the other websites !
Other guidelines
© 2013 IBM Corporation
IBM Security Systems
5
A new stronger encryption algorithm KDFAES for passwords and password phrases. Easily activation with
the SETROPTS command:
SETROPTS PASSWORD(ALGORITHM(KDFAES))
RACF can help in password policy !
RACF provides enhancements to mantain an effective password policy
KDFAES
Encryption
© 2013 IBM Corporation
IBM Security Systems
6
 The new encryption algorithm is KDFAES (Key Derivation Function with AES).
The key derivation function appends random data to the password or password phrase, and then iteratively
hashes it with SHA256 to derive a 256-bit encryption key. This key is then used to AES-encrypt the user ID
appended with other data. The result is the password hash.This hash is stored in the RACF database along
with the random data, and other parameters, that were used to derive it
 A function is provided to convert existing DES passwords to the new format without requiring the
passwords to be changed. This does not convert password phrases or password phrase history
You can use the new ALTUSER PWCONVERT keyword:
ALTUSER userID PWCONVERT
 With a simple SEARCH command you can create the commands to convert all users to KDFAES
SEARCH CLASS(USER) CLIST('ALTUSER ' ' PWCONVERT')
 Now you can demonstrate to an auditor that passwords and password phrases are encrypted under the
new algorithm with the help of new fields created by the IRRDBU00 utility. A sample query is also
provided
New KDFAES algorithm
© 2013 IBM Corporation
IBM Security Systems
7
RACF now provide the support for 14 additional special characters in passwords
SETROPTS PASSWORD(SPECIALCHARS)
The password space is increased, and thus the work factor that is involved in cracking a
password. It also allows users to choose passwords that are less likely to exist in a list of
frequently used passwords that are the first ones that are attempted in a cracking effort.
Two new values are available for SETROPTS password rules:
 SPECIAL : includes all of the new special characters plus the national characters ‘#’(X’7B’),
‘$’ (X’5B’) and “@” (X’7C’)
 MIXEDALL: allows all password characters. Can be used to force selections from each
character grouping (upper case, lower case, numeric, and national/special) depending on
the number of MIXEDALL positions and SETROPTS MIXEDCASE is in effect.
Special characters in the password
$@#.<+|&!*-%_>?:=
© 2013 IBM Corporation
IBM Security Systems
8
Higher quality in password syntax
• The user can have a password phrase without a password. This allows for a much longer
authenticator, without the effort and exposure of also maintaining a password, or having to write,
install, and maintain an exit
ALTUSER userID NOPASSWORD
• The LISTUSER command identifies a phrase-only user by the attributes NOPASSWORD and
PASSPHRASE
A new password syntax control: a password had
to contain at least one character from each of four
different categories: uppercase letters, lowercase
letters, numeric digits, and symbolic characters
(which include the existing national characters
and the newly supported special characters).
This can help prevent users from choosing weak
passwords
© 2013 IBM Corporation
IBM Security Systems
9
 ALTUSER command improvement: to mark a user's password and password phrase as expired, without
having to change its value. You can force a password change without needing to generate and
communicate a random temporary password.
ALTUSER userID EXPIRED
 ALTUSER command improvement: to clean up password history after changing the SETROPTS
PASSWORD(HISTORY(n)) value. This replaces the need for the CUTPWHIS utility available as a
download on the RACF website.
ALTUSER userID PWCLEAN
More password improvements
© 2013 IBM Corporation
IBM Security Systems
10
While the new algorithm and special character support can be activated using the SETROPTS command,
consider the following before activating them:
Considerations before activation
• Create a backup copy of your RACF database
• Apply OA43998 and OA43999 to all systems sharing the RACF database
• Make sure all necessary PTFs are applied to other products that are
affected by this support
• Check programs you have written to ensure that they can tolerate the new
function
• Determine if the new function affects RACF exits, if present on your system
• If you are using RACF downloads, determine if they are affected
• Consider effects on the performance and space usage of your RACF
database.
• Activate and test the new functions in your application test environment
before activating them in your production environment
Note: The new encryption algorithm uses the Central Processor Assist For Cryptographic Function (CPACF) to perform SHA-
256 operations. When the CPACF is not available, SHA-256 is performed in software. Therefore, consider planning a
performance test to ensure that the increased computational complexity does not create a performance issue on these older
processors.
© 2013 IBM Corporation
IBM Security Systems
1111
Thanks !

More Related Content

What's hot

아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018
아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018
아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018
Amazon Web Services Korea
 
Xdc command-to-print-job-output-and-syslog-from-sdsf
Xdc command-to-print-job-output-and-syslog-from-sdsfXdc command-to-print-job-output-and-syslog-from-sdsf
Xdc command-to-print-job-output-and-syslog-from-sdsf
Maintec Technologies Inc.
 

What's hot (20)

High Availability of SAP ASCS in Microsoft Azure
High Availability of SAP ASCS in Microsoft AzureHigh Availability of SAP ASCS in Microsoft Azure
High Availability of SAP ASCS in Microsoft Azure
 
XenDesktop 7.6とXenApp 7.6の移行および注意点について徹底解説
XenDesktop 7.6とXenApp 7.6の移行および注意点について徹底解説 XenDesktop 7.6とXenApp 7.6の移行および注意点について徹底解説
XenDesktop 7.6とXenApp 7.6の移行および注意点について徹底解説
 
z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolver
 
AWS運用自動化への第一歩 
AWS運用自動化への第一歩 AWS運用自動化への第一歩 
AWS運用自動化への第一歩 
 
どう変わる? 新シスコ認定トレーニング ~CCNAとCCNP Enterprise~
どう変わる? 新シスコ認定トレーニング ~CCNAとCCNP Enterprise~どう変わる? 新シスコ認定トレーニング ~CCNAとCCNP Enterprise~
どう変わる? 新シスコ認定トレーニング ~CCNAとCCNP Enterprise~
 
Optimizing Your z/OS Mainframe Through zIIP Offload and SQL Analysis
Optimizing Your z/OS Mainframe Through zIIP Offload and SQL AnalysisOptimizing Your z/OS Mainframe Through zIIP Offload and SQL Analysis
Optimizing Your z/OS Mainframe Through zIIP Offload and SQL Analysis
 
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
 
IP Routing on z/OS
IP Routing on z/OSIP Routing on z/OS
IP Routing on z/OS
 
AWS Systems manager 入門
AWS Systems manager 入門AWS Systems manager 入門
AWS Systems manager 入門
 
HAProxy TCP 모드에서 내부 서버로 Source IP 전달 방법
HAProxy TCP 모드에서 내부 서버로 Source IP 전달 방법HAProxy TCP 모드에서 내부 서버로 Source IP 전달 방법
HAProxy TCP 모드에서 내부 서버로 Source IP 전달 방법
 
DB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in NutshellDB2 for z/OS Architecture in Nutshell
DB2 for z/OS Architecture in Nutshell
 
아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018
아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018
아마존 웹 서비스 상에서 MS SQL 100% 활용하기::김석원::AWS Summit Seoul 2018
 
Xdc command-to-print-job-output-and-syslog-from-sdsf
Xdc command-to-print-job-output-and-syslog-from-sdsfXdc command-to-print-job-output-and-syslog-from-sdsf
Xdc command-to-print-job-output-and-syslog-from-sdsf
 
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
 
Db2 analytics accelerator technical update
Db2 analytics accelerator  technical updateDb2 analytics accelerator  technical update
Db2 analytics accelerator technical update
 
z/OS Communications Server Overview
z/OS Communications Server Overviewz/OS Communications Server Overview
z/OS Communications Server Overview
 
z/OS Encryption Readiness Technology (zERT)
z/OS Encryption Readiness Technology (zERT) z/OS Encryption Readiness Technology (zERT)
z/OS Encryption Readiness Technology (zERT)
 
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS SummitEvolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
 
RDS & Windows Virtual Desktop - Desktop in 2019+
RDS & Windows Virtual Desktop - Desktop in 2019+RDS & Windows Virtual Desktop - Desktop in 2019+
RDS & Windows Virtual Desktop - Desktop in 2019+
 
Openshift Container Platform
Openshift Container PlatformOpenshift Container Platform
Openshift Container Platform
 

Similar to Racf psw enhancement

Embedded os
Embedded osEmbedded os
Embedded os
chian417
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
richarddxd
 
136 latest dot net interview questions
136  latest dot net interview questions136  latest dot net interview questions
136 latest dot net interview questions
sandi4204
 

Similar to Racf psw enhancement (20)

MySQL Quick Dive
MySQL Quick DiveMySQL Quick Dive
MySQL Quick Dive
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
Securing your azure web app with asp.net core data protection
Securing your azure web app with asp.net core data protectionSecuring your azure web app with asp.net core data protection
Securing your azure web app with asp.net core data protection
 
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov1712.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
 
Encrypted Negative Password using for Authentication
Encrypted Negative Password using for AuthenticationEncrypted Negative Password using for Authentication
Encrypted Negative Password using for Authentication
 
Top Ten Java Defense for Web Applications v2
Top Ten Java Defense for Web Applications v2Top Ten Java Defense for Web Applications v2
Top Ten Java Defense for Web Applications v2
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Embedded os
Embedded osEmbedded os
Embedded os
 
SQL Server 2017 CLR
SQL Server 2017 CLRSQL Server 2017 CLR
SQL Server 2017 CLR
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
2014 OpenSuse Conf: Protect your MySQL Server
2014 OpenSuse Conf: Protect your MySQL Server2014 OpenSuse Conf: Protect your MySQL Server
2014 OpenSuse Conf: Protect your MySQL Server
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
SQL Server 2017 CLR
SQL Server 2017 CLRSQL Server 2017 CLR
SQL Server 2017 CLR
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
Foundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptxFoundations of Cybersecurity's.pptx
Foundations of Cybersecurity's.pptx
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
 
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloudKoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
136 latest dot net interview questions
136  latest dot net interview questions136  latest dot net interview questions
136 latest dot net interview questions
 

More from Luigi Perrone (12)

EKMF solution overview
EKMF solution overviewEKMF solution overview
EKMF solution overview
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Sklm webinar
Sklm webinarSklm webinar
Sklm webinar
 
Mfa.intro
Mfa.introMfa.intro
Mfa.intro
 
Pervasive Encryption for DB2
Pervasive Encryption for DB2Pervasive Encryption for DB2
Pervasive Encryption for DB2
 
Key management
Key managementKey management
Key management
 
z/OS Pervasive Encryption
z/OS Pervasive Encryptionz/OS Pervasive Encryption
z/OS Pervasive Encryption
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
2017 racf 2.3 news
2017 racf 2.3 news2017 racf 2.3 news
2017 racf 2.3 news
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
Come integrare il mainframe con QRadar
Come integrare il mainframe con QRadarCome integrare il mainframe con QRadar
Come integrare il mainframe con QRadar
 
Fare sicurezza con zSecure
Fare sicurezza con zSecureFare sicurezza con zSecure
Fare sicurezza con zSecure
 

Recently uploaded

Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 

Recently uploaded (20)

A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 

Racf psw enhancement

  • 1. © 2012 IBM Corporation IBM Security Systems 1© 2013 IBM Corporation A new leap forward … in RACF password security Luigi Perrone Technical Pre-Sales System Engineer IBM Security Systems luigi_perrone@it.ibm.com
  • 2. © 2013 IBM Corporation IBM Security Systems 2  password length  password quality  encryption strength  password DB access control  policy controls  user education Elements of password security What are the more important characteristics for password security ? All of these aspects should be considered together to provide a multi-layered and interdependent set of defenses
  • 3. © 2013 IBM Corporation IBM Security Systems 3 General guidelines  Short password change interval …..to minimize the chance that a password can be cracked during its lifecycle  Good password history …..to keep users from reusing the same password. In this mode an attacker does not essentially have the sufficient time to crack it !  Real strong encryption …..to force the use of time and resources in a brute-force attack. Some interesting suggestions ...are they implemented ?
  • 4. © 2013 IBM Corporation IBM Security Systems 4  Effective access control of the password database …..to ensures that nobody can start an offline attack against encrypted passwords  Invalid password revoke count policy …..to prevents repeated guesses against a user's password  Revoke count low .....if all history vales were cracked the changes of guessing which one might be the current password would be reduced  User education …..for example don’t use the same password in RACF and in the other websites ! Other guidelines
  • 5. © 2013 IBM Corporation IBM Security Systems 5 A new stronger encryption algorithm KDFAES for passwords and password phrases. Easily activation with the SETROPTS command: SETROPTS PASSWORD(ALGORITHM(KDFAES)) RACF can help in password policy ! RACF provides enhancements to mantain an effective password policy KDFAES Encryption
  • 6. © 2013 IBM Corporation IBM Security Systems 6  The new encryption algorithm is KDFAES (Key Derivation Function with AES). The key derivation function appends random data to the password or password phrase, and then iteratively hashes it with SHA256 to derive a 256-bit encryption key. This key is then used to AES-encrypt the user ID appended with other data. The result is the password hash.This hash is stored in the RACF database along with the random data, and other parameters, that were used to derive it  A function is provided to convert existing DES passwords to the new format without requiring the passwords to be changed. This does not convert password phrases or password phrase history You can use the new ALTUSER PWCONVERT keyword: ALTUSER userID PWCONVERT  With a simple SEARCH command you can create the commands to convert all users to KDFAES SEARCH CLASS(USER) CLIST('ALTUSER ' ' PWCONVERT')  Now you can demonstrate to an auditor that passwords and password phrases are encrypted under the new algorithm with the help of new fields created by the IRRDBU00 utility. A sample query is also provided New KDFAES algorithm
  • 7. © 2013 IBM Corporation IBM Security Systems 7 RACF now provide the support for 14 additional special characters in passwords SETROPTS PASSWORD(SPECIALCHARS) The password space is increased, and thus the work factor that is involved in cracking a password. It also allows users to choose passwords that are less likely to exist in a list of frequently used passwords that are the first ones that are attempted in a cracking effort. Two new values are available for SETROPTS password rules:  SPECIAL : includes all of the new special characters plus the national characters ‘#’(X’7B’), ‘$’ (X’5B’) and “@” (X’7C’)  MIXEDALL: allows all password characters. Can be used to force selections from each character grouping (upper case, lower case, numeric, and national/special) depending on the number of MIXEDALL positions and SETROPTS MIXEDCASE is in effect. Special characters in the password $@#.<+|&!*-%_>?:=
  • 8. © 2013 IBM Corporation IBM Security Systems 8 Higher quality in password syntax • The user can have a password phrase without a password. This allows for a much longer authenticator, without the effort and exposure of also maintaining a password, or having to write, install, and maintain an exit ALTUSER userID NOPASSWORD • The LISTUSER command identifies a phrase-only user by the attributes NOPASSWORD and PASSPHRASE A new password syntax control: a password had to contain at least one character from each of four different categories: uppercase letters, lowercase letters, numeric digits, and symbolic characters (which include the existing national characters and the newly supported special characters). This can help prevent users from choosing weak passwords
  • 9. © 2013 IBM Corporation IBM Security Systems 9  ALTUSER command improvement: to mark a user's password and password phrase as expired, without having to change its value. You can force a password change without needing to generate and communicate a random temporary password. ALTUSER userID EXPIRED  ALTUSER command improvement: to clean up password history after changing the SETROPTS PASSWORD(HISTORY(n)) value. This replaces the need for the CUTPWHIS utility available as a download on the RACF website. ALTUSER userID PWCLEAN More password improvements
  • 10. © 2013 IBM Corporation IBM Security Systems 10 While the new algorithm and special character support can be activated using the SETROPTS command, consider the following before activating them: Considerations before activation • Create a backup copy of your RACF database • Apply OA43998 and OA43999 to all systems sharing the RACF database • Make sure all necessary PTFs are applied to other products that are affected by this support • Check programs you have written to ensure that they can tolerate the new function • Determine if the new function affects RACF exits, if present on your system • If you are using RACF downloads, determine if they are affected • Consider effects on the performance and space usage of your RACF database. • Activate and test the new functions in your application test environment before activating them in your production environment Note: The new encryption algorithm uses the Central Processor Assist For Cryptographic Function (CPACF) to perform SHA- 256 operations. When the CPACF is not available, SHA-256 is performed in software. Therefore, consider planning a performance test to ensure that the increased computational complexity does not create a performance issue on these older processors.
  • 11. © 2013 IBM Corporation IBM Security Systems 1111 Thanks !