• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Admin Alert: Eliminating Easy-to-Guess User Passwords

    August 8, 2007 Joe Hertvik

    A chronic System i security problem is that without proper system configuration, users can create easy-to-guess and easy-to-hack passwords when they use the PC5250 Change iSeries Password function, the Change Password command (CHGPWD), or the Change User Profile command (CRTUSRPRF) to change their passwords. This week, I’ll look at some simple system configurations you can perform to ensure that user-created passwords are always sufficiently complex for system security.

    What I Mean By Easily Guessed Passwords

    Easily guessed passwords include any user password that a middle school student could reasonably guess if they just have a little information about the person signing on. For the purposes of this article, I will focus on how you configure your System i, iSeries, and AS/400 partitions to prevent users from entering any of the following easy-to-guess password types.

    Default passwords: Where the password is the same as the user profile name (i.e., a user profile name of JOE that has the password ‘JOE’).

    Honey-bee names: Where the password is equal to the name of something the user holds dear (spouse name, dog name, movie characters, sports teams, etc).

    Unlucky numbers: Where the password is the same as a significant number in the user’s life (telephone numbers or extensions, birth date, etc).

    Likealooks: All of the above password types with one or two minor changes to make them “harder” to guess (i.e., ‘JOE’ becomes ‘JOE1’ or ‘J0E’).

    As I said, these passwords are so easy that a 12-year-old should be able to figure them out and that’s where you need to shore up your i5/OS security. Here are some easy configurations to automatically make your users create more secure passwords.

    The Well-Composed Password

    i5/OS and OS/400 password composition rules are defined in the i5/OS system values that start with the literal QPWD* (for example, QPWDMAXLEN, QPWDLMTREP, etc). You can access and change these values on either the green-screen or in iSeries Navigator (OpsNav). As delivered, all password composition rules are turned off, and any changes to the rules take effect immediately for all but one user password change situation.

    To view and change your composition rules on the green-screen, use the following Work with System Values command.

    WRKSYSVAL SYSVAL(QPWD*)

    To change these system values in OpsNav, open the Validation tab on the Password Policy Properties screen. This screen can be reached by following the Security –> Polices –> Password Policy OpsNav path for your target partition.

    At the bottom of this article, I provide a list of all the i5/OS Password Composition system values and what each value does. You may also want to check out an earlier article by Wayne Evans on Creating Effective Passwords. Wayne’s article contains all password-related system values plus some general principles for defining effective password policies. For this article, I’ll teach by example. I’m going to take the four easy-to-guess password types listed at the top of the article, and demonstrate how to configure your operating system to prevent users from entering each type of password.

    Where Users Can Change Passwords

    In most shops, users can change their passwords in the following ways. With one exception, these user-directed password changes all follow the password composition rules that I’m discussing here.

    • In the PC5250 program that comes with iSeries Access for Windows, a Change iSeries Password popup box will appear after the user attempts to sign on when their password is expired.
    • When making a connection to a System i box from a remote computer, a pop-up password change prompt will also appear when the password is expired.
    • By using the Change Password command (CHGPWD) from the green-screen. This command is sometimes wrappered inside vendor-written or custom-written software.
    • By using the Change User Profile command (CHGUSRPRF) from the green-screen.

    The CHGUSRPRF Gotcha

    Of these techniques, please note that all bets for controlling password composition are off if you allow your users to change their passwords by using the Change User Profile command (CHGUSRPRF). As a general rule, this command should be restricted only to system administrators. CHGUSRPRF does not enforce password composition rules for password changes, so users can execute CHGUSRPRF to change their password to any value they wish, including the default password. (note: the other techniques do enforce the composition rules).

    But don’t think that that it’s just application users who use CHGUSRPRF to enter trivial passwords. I once worked in a shop where the iSeries administrator preferred to keep his own password set at the default value for 17 different iSeries and AS/400 machines, which is a pretty serious breach of corporate security, and he always used CHGUSRPRF to make that change. So you have to keep on your toes and you even need to check out those users who are responsible for security.

    Stopping Default Passwords

    It’s easy to prevent users from changing their password to the default password, where the password value is the same as the user profile name. This can be done by changing one or more of the password composition settings (the PWD* system values) from their default value. If any of these values are modified, the system will prevent the user from entering their default password as a new password value. However, if you don’t change at least one password composition system value from its shipped status, the user will be able to change the password back to its default. So make sure to activate at least one setting to remove this threat.

    De-Populating the Honey Bee Population

    To prevent passwords where the value is equal to the name of something the user holds dear, such as the name of the user’s spouse, dog, or favorite movie character (ex., ‘MELISSA’, ‘BUBBA’ or ‘HANNIBAL’), you can activate the following system values in conjunction with each other to make these passwords harder to guess.

    • Limit characters in password (QPWDLMTCHR) or Restricted Characters in OpsNav. QPWDLMTCHR allows you to specify a list of characters that cannot be used in a password. So if you use QPWDLMTCHR to specify that a user cannot use any vowels in his password (‘AEIOUY’), the users would have to enter abbreviated versions of words, such as ‘MLSS’, ‘BBB’ OR ‘HNNBL’ instead of ‘MELISSA’, BUBBA’ or ‘HANNIBAL’. With this value set, Users can only enter variants of common words, not the words themselves. Think of using QPWDLMTCHR to remove vowels from passwords as the license plate method of password control.
    • Require digit in password (QPWDRQDDGT) or Require at least one digit in OpsNav. This value forces users to include at least one numeric digit (0-9) in the password so that the password cannot be equal to any normal word.
    • Limit repeating characters in password (QPWDLMTREP) or Restrict repeating characters in OpsNav. Using this system value, users cannot enter passwords where one of the characters is repeated (such as the ‘B’ in ‘BUBBA’), which makes it harder to enter common words.

    Losing Lucky Numbers

    Recently, I wrote a column that described how i5/OS can allow user passwords to begin and end with a number. This means that users can conceivably sign on to the system by using their birth dates, telephone numbers, employee ID numbers, etc. To discourage this practice, you can turn on the Limit adjacent digits in passwords system value (QPWDLMTAJC, or Restrict Consecutive Digits in OpsNav), and the password composition rules will not let the user enter two numeric digits in a row when creating a password.

    Likealooks–Stopping Those Who Are the Same, Only Different

    Likealook passwords retain the same form as the prior password the user is changing from, but they have one key difference. The new password is usually created by adding or incrementing a number to the end of the old password or by changing one character of the old password for another (i.e., changing a password of ‘JOE’ to ‘JOE1’ or changing ‘JOE’ to ‘J0E’). Likealooks can easily be stopped by turning on the Limit password character positions system value (QPWDPOSDIF or Require a new character in each position in OpsNav). QPWDPOSDIF prevents users from entering passwords in which any of the characters in the new password are in the same position as the characters in the old password. So if I tried to change my password from ‘JOE’ to ‘JOE1’, I would be stopped because the system wouldn’t allow me to enter the letters ‘J’, ‘O’, and ‘E’ in the same position as they were in my prior password.

    And the Only Problem Is . . . .

    The one flaw in using system values to control password composition is that the new requirements may annoy your users when they have to change their password. It might even increase help desk calls if some users can’t figure out why the system won’t let them enter the password they want. But since user passwords are usually only changed once every so many months, it is worth the inconvenience to obtain better system security.

    About Our Testing Environment

    Configurations described in this article were tested on an i5 550 box running i5/OS V5R3. Many of the commands may also be available in earlier versions of the operating system running on iSeries or AS/400 machines. iSeries Navigator (OpsNav) features were tested with the OpsNav version that is shipped with iSeries Access for Windows V5R3M0. If a command is present in earlier versions of the i5/OS or OS/400 operating systems, you may notice some variations in the pre-V5R3 copies of these commands. These differences may be due to command improvements that have occurred from release to release.

    i5/OS Password Composition System Values

    System Value

    iSeries
    Navigator (OpsNav) Password Policy Name

    Password
    Composition rule

    QPWDLMTAJC

    Restrict
    Consecutive Digits

    Don’t allow two
    consecutive numeric digits (0-9) in a password

    QPWDLMTCHR

    Restricted
    Characters

    Don’t allow specific
    characters to be used in password

    QPWDLMTREP

    Restrict
    Repeating Characters

    Specifies
    whether the same character can be used twice in the password, or whether the
    character can be repeated consecutively (ex., ‘BBBBB’)

    QPWDMAXLEN

    Maximum Length
    (1-10)

    Maximum length
    of the entered password (Password level ‘0’ or ‘1’ only)

    QPWDMINLEN

    Minimum Length
    (1-10)

    Minimum length
    of the entered password (Password level ‘0’ or ‘1’ only)

    QPWDPOSDIF

    Require a new
    character in each position

    Password cannot
    contain any of the same characters in the same positions that they occupied
    in the previous password

    QPWDRQDDGT

    Require at least
    one digit

    Password must contain
    at least one number (0-9)

    QPWDRQDDIF

    Password re-use
    cycle

    Password cannot
    be the same as any of the previous 4, 6, 8, 10, 12, etc passwords previously
    entered by this user

    RELATED STORIES

    Creating Effective Passwords

    Weird i5 User Profile Sign-On Secrets



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    DRV Technologies:  Automatically convert and distribute AS/400 reports with SpoolFlex
    Maximum Availability:  The ultimate System i replication for business of all sizes
    COMMON:  Join us at the Annual 2008 conference, March 30 - April 3, in Nashville, Tennessee

    IT Jungle Store Top Book Picks

    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Cape Clear Tests New ESB Release Power6-Based System i Performance: Your Mileage Will Vary

    Leave a Reply Cancel reply

Volume 7, Number 29 -- August 8, 2007
THIS ISSUE SPONSORED BY:

Help/Systems
ProData Computer Services
Guild Companies

Table of Contents

  • Let WDSc Help You Format Your Source Code
  • Which One Is the Culprit?
  • Admin Alert: Eliminating Easy-to-Guess User Passwords

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle