home *** CD-ROM | disk | FTP | other *** search
- Comments: Gated by NETNEWS@AUVM.AMERICAN.EDU
- Path: sparky!uunet!paladin.american.edu!auvm!VM1.ULAVAL.CA!ADMIN
- Message-ID: <IBM-MAIN%92081408470517@VM1.CC.UAKRON.EDU>
- Newsgroups: bit.listserv.ibm-main
- Date: Fri, 14 Aug 1992 08:39:14 HAE
- Sender: IBM Mainframe Discussion list <IBM-MAIN@RICEVM1.BITNET>
- From: Jean Bedard <ADMIN@VM1.ULAVAL.CA>
- Subject: Re: VM Password protection
- In-Reply-To: Message of Tue,
- 11 Aug 1992 17:05:31 EDT from <V4039@VM.TEMPLE.EDU>
- Lines: 18
-
- > (...) I am wondering if there is a utility of some
- >sort that goes through all IBM accounts here and verifies that their
- >passwords are not common words in the english language. Does anyone know of
- >a utility like this that would find such poorly chosen passwords and require
- >the user to select someone less likely to be hacked at?
-
- VM has a built-in facility called Auto-Deactivation
- of Restricted Passwords (ADRP). If you create a LRECL=8 file called
- RPWLIST DATA containing unwanted passwords and then issue the DIRECT command,
- these passwords will be rejected (DIRECT will have a non-zero return code).
- VM/SP 6, for example, comes with a sample RPWLIST DATA containing all
- passwords used in the sample VMUSERS DIRECT file; you can tailor as you wish.
-
- This is documented in my VM/SP 6 Installation Guide.
-
- Jean Bedard, C.T.I., Universite Laval, Quebec, Canada
- Resp. VM/CMS, NetNorth, Listserv Bitnet: ADMIN AT LAVALVM1
- (418) 656-3632 Internet: admin@vm1.ulaval.ca
-