ASG
IBM
Zystems
Cressida
Icon
Netflexity
 
  MQSeries.net
Search  Search       Tech Exchange      Education      Certifications      Library      Info Center      SupportPacs      LinkedIn  Search  Search                                                                   FAQ  FAQ   Usergroups  Usergroups
 
Register  ::  Log in Log in to check your private messages
 
RSS Feed - WebSphere MQ Support RSS Feed - Message Broker Support

MQSeries.net Forum Index » Clustering » Untrusted Cluster Members

Post new topic  Reply to topic
 Untrusted Cluster Members « View previous topic :: View next topic » 
Author Message
JBrown
PostPosted: Wed Feb 14, 2007 12:48 pm    Post subject: Untrusted Cluster Members Reply with quote

Newbie

Joined: 14 Feb 2007
Posts: 6

My department operates QMGR1 on BOX1 and QMGR2 on BOX2 and another department operates QMGR3 on BOX3. All boxes run W2K and are on the same domain and all are using v6 of the MQ software. Our queue mangers are administered by a local user mqadminA and their queue manager is administered by a domain user mqadminB. All three queue managers are in a cluster CLSTR1. For legal reasons we have to keep our departments as seperate as possible, and for political reasons we have to use a cluster setup.

How can I prevent them from making changes to our queue managers?

As far as I understand it, if a user is not in the Administrators or MQM group they cannot administor MQSeries, yet I can use MQ Explorer to connect remotely and modify queue managers on machines I am not an admin on.
Back to top
View user's profile Send private message
Michael Dag
PostPosted: Thu Feb 15, 2007 12:30 am    Post subject: Reply with quote

Jedi Knight

Joined: 13 Jun 2002
Posts: 2607
Location: The Netherlands (Amsterdam)

I don't think this is a clustering issue, how are you connecting remotely to 'their' Qmgr(s)?

Can you logon to their machines and act as mqm?
if the above is no, then their SVRCONN channels are probably not secured against you accessing them.

Get at least a security exit on the SVRCONN's or enable SSL on these channels...

Last thing... can they access your Qmgr? (or don't they know... )
_________________
Michael



MQSystems Facebook page
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
JBrown
PostPosted: Thu Feb 15, 2007 7:35 am    Post subject: Reply with quote

Newbie

Joined: 14 Feb 2007
Posts: 6

It is a clustering issue in part because our queue managers are clustered with theirs. The problem is that if you have the authority to administer one queue manager in the cluster, you apparently have the authority to administer all of them. I want to be able to prevent the other department from being able to administer the queue managers that we're responsible for. Our queue managers are administered by a local user on each box and their queue managers are administered by a single domain user.

I can use MQ Explorer to remotly connect to their queue managers and make changes even though I am not in the administrators or mqm group on their boxes. And I know they can do the same to ours. I want to prevent this.

I cannot logon to their machines because I dont have physical or remote access to their servers. If you login to our machines as a user who does not have mqm admin rights you cant make changes, but as I said they can use the MQ Explorer to make changes.
Back to top
View user's profile Send private message
oz1ccg
PostPosted: Sun Feb 18, 2007 6:46 am    Post subject: Reply with quote

Yatiri

Joined: 10 Feb 2002
Posts: 628
Location: Denmark

You say that the queue managers are i the same Windows domain.
Are the queuemanages domain aware started with a domain user or are they running under MUSR_MQADMIN ?

When you have administrative contact with QMGR3 please check status of the SVRCONN channels to see if that's the way MQExplorer are trying to administrer QMGR3.

You could use BlockIP2 to secure your queue manager, by filtering the connames that are alowed to connect to the queuemanager....

If the administration are happening theu the MQ Cluster infrastructure it's another game.... Because you can't just remove the access to the COMMAND.QUEUE, if you do the cluster will stop working....
And about playing with exits to lift this scenario is also quite complicated because you maight have to create multple exits and have other exits to help them.. A non trivial task. (I've been playing with cluster security for some time now).

So let's see if it's possible to smack the door using the SVRCONN channels. You could try to stop: SYSTEM.ADMIN.SVRCONN and then try remote admin.

If this works then it's just a SSL or BlockIP2 job or SecureMQ or more fancy..
I know a lot of happy friends using BlockIP2

I hope it can help you.

-- lock it or Lose it --
_________________
Regards, Jørgen
Home of BlockIP2, the last free MQ Security exit ver. 3.00
Cert. on WMQ, WBIMB, SWIFT.
Back to top
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
JBrown
PostPosted: Tue Feb 20, 2007 12:22 pm    Post subject: Reply with quote

Newbie

Joined: 14 Feb 2007
Posts: 6

They are running under MUSR_MQADMIN. I'm not sure where to look for the SVRCONN channel. MQExplorer uses the Cluster-Sender and Cluster-Receiver channels to do remote administration. In MQExplorer I can stop the Command Server for the queue manager and that prevents remote administration and still allows the putting of messages, but I have to turn it back on every time I want to make changes to the queue manager. While I could just stop the Command Server when Im not making changes, there is something to be said about doing it right. If I could restrict access to the COMMAND.QUEUE so that only a certain username can put to it, that would be great.
Back to top
View user's profile Send private message
Michael Dag
PostPosted: Tue Feb 20, 2007 3:27 pm    Post subject: Reply with quote

Jedi Knight

Joined: 13 Jun 2002
Posts: 2607
Location: The Netherlands (Amsterdam)

keep the command server down and use runmqsc instead, it does not need the command server to run.
_________________
Michael



MQSystems Facebook page
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
fjb_saper
PostPosted: Wed Feb 21, 2007 3:38 am    Post subject: Reply with quote

Grand High Poobah

Joined: 18 Nov 2003
Posts: 20756
Location: LI,NY

Michael Dag wrote:
keep the command server down and use runmqsc instead, it does not need the command server to run.

Only if you use it local to the box the server is on.
If you use it remotely (remote admin through a default qmgr) or use MO72 support pack you will need the command server...)

Have you thought about limiting their access to your cluster?
Set an mcauser on the cluster receiver. Allow only connect display inquire and put access to that user...

Run the qmgrs with a service user that has the same characteristics and group memberships as the default service user but has a different name. Remove the default service user from the mqm and admin groups...


Enjoy
_________________
MQ & Broker admin
Back to top
View user's profile Send private message Send e-mail
Michael Dag
PostPosted: Wed Feb 21, 2007 4:24 am    Post subject: Reply with quote

Jedi Knight

Joined: 13 Jun 2002
Posts: 2607
Location: The Netherlands (Amsterdam)

fjb_saper wrote:
Michael Dag wrote:
keep the command server down and use runmqsc instead, it does not need the command server to run.

Only if you use it local to the box the server is on.

true, i thought that was clear
_________________
Michael



MQSystems Facebook page
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
JBrown
PostPosted: Wed Feb 28, 2007 11:17 am    Post subject: Reply with quote

Newbie

Joined: 14 Feb 2007
Posts: 6

fjb_saper wrote:
Have you thought about limiting their access to your cluster?
Set an mcauser on the cluster receiver. Allow only connect display inquire and put access to that user...


Okay, here is what I did:

1) Created a separate cluster-receiver for the other department to connect to
2) Set the MCAUSER on the new cluster-receiver to the domain user that they use
3) Set the permissions for that user for my queue manager to +setall +connect +inq
4) Set the permissions for the SYSTEM.CLUSTER.COMMAND.QUEUE and SYSTEM.DEAD.LETTER.QUEUE to +setall +put
5) Set any queues the other department needs to put to to +setall +put

After working through the error logs, these are the minimum amount of permissions I can give and still have it work. Also I didn't have to use their domain user as the MCAUSER but it was handy and self-documenting. Now that it works I guess my only question is what does the 'setall' permission do and why does it need to be set?
Back to top
View user's profile Send private message
ppdollar
PostPosted: Thu Mar 15, 2007 7:06 pm    Post subject: Reply with quote

Novice

Joined: 31 Aug 2005
Posts: 20

remove SYSTEM.ADMIN.SVRCONN channels from your qmgrs and if there are any SVRCONN channels on your qmgrs add 'mcauser' as 'nobody'.

Be careful and make sure that no apps are using these svrconn channels.

and I'm pretty sure that nobody will be able to connect to the qmgrs remotely using any third party tools.
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic  Reply to topic Page 1 of 1

MQSeries.net Forum Index » Clustering » Untrusted Cluster Members
Jump to:  



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
Protected by Anti-Spam ACP
 
 


Theme by Dustin Baccetti
Powered by phpBB © 2001, 2002 phpBB Group

Copyright © MQSeries.net. All rights reserved.