ASG
IBM
Zystems
Cressida
Icon
Netflexity
 
  MQSeries.net
Search  Search       Tech Exchange      Education      Certifications      Library      Info Center      SupportPacs      LinkedIn  Search  Search                                                                   FAQ  FAQ   Usergroups  Usergroups
 
Register  ::  Log in Log in to check your private messages
 
RSS Feed - WebSphere MQ Support RSS Feed - Message Broker Support

MQSeries.net Forum IndexIBM MQ SecurityMQ, SSL and the POODLE attack

Post new topicReply to topic Goto page Previous  1, 2
MQ, SSL and the POODLE attack View previous topic :: View next topic
Author Message
PeterPotkay
PostPosted: Thu Oct 23, 2014 3:13 am Post subject: Reply with quote

Poobah

Joined: 15 May 2001
Posts: 7722

tczielke wrote:
So it does look like there are MQ SSL v3 ciphers (i.e RC4_MD5_US) that are not susceptible to POODLE.


I would not use any Cipher based on MD5.

http://en.wikipedia.org/wiki/MD5
Quote:
In 2004 it was shown that MD5 is not collision resistant.[5] As such, MD5 is not suitable for applications like SSL certificates or digital signatures that rely on this property for digital security. Also in 2004 more serious flaws were discovered in MD5, making further use of the algorithm for security purposes questionable;

_________________
Peter Potkay
Keep Calm and MQ On
Back to top
View user's profile Send private message
tczielke
PostPosted: Thu Oct 23, 2014 4:50 am Post subject: Reply with quote

Guardian

Joined: 08 Jul 2010
Posts: 941
Location: Illinois, USA

The two articles I included also talked disparagingly about RC4.

I am definitely not trying to endorse RC4_MD5_US, or refute the overall recommendation of the IBM MQ security bulletin on POODLE to move from SSL v3 to TLS ciphers.

However, it does seem that POODLE itself is a vulnerability against SSL v3 CBC based ciphers. So POODLE itself would not require a remediation of moving from RC4_MD5_US. If my understanding is incorrect, I would appreciate if someone would correct it.
Back to top
View user's profile Send private message
mqjeff
PostPosted: Thu Oct 23, 2014 7:13 am Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

My understanding is that POODLE addresses a vulnerability in SSLv3 itself, not necessarily one with CBCs.

If that's the case, the cipherspec wouldn't matter.

But I could be wrong on that.
Back to top
View user's profile Send private message
tczielke
PostPosted: Thu Oct 23, 2014 7:19 am Post subject: Reply with quote

Guardian

Joined: 08 Jul 2010
Posts: 941
Location: Illinois, USA

mqjeff wrote:
My understanding is that POODLE addresses a vulnerability in SSLv3 itself, not necessarily one with CBCs.

If that's the case, the cipherspec wouldn't matter.

But I could be wrong on that.


That was my original understanding based on the MQ POODLE security bulletin, too. However, after talking to one of our web server admins, he mentioned that he had heard that POODLE was actually a vulnerability against CBC based SSL v3 ciphers. I did a little research on the web to get other sources that seemed to support for that assertion. So just curious if anyone had a definitive answer on that topic.
Back to top
View user's profile Send private message
tczielke
PostPosted: Fri Oct 24, 2014 4:39 am Post subject: Reply with quote

Guardian

Joined: 08 Jul 2010
Posts: 941
Location: Illinois, USA

I did open a PMR to get some clarity to my question on if a SSL v3 cipher like RC4_MD5_US (which I think is non-CBC) is susceptible to POODLE. This was the response.

“The vulnerability is specifically within the SSLv3 protocol, thus that protocol must not be used if the customer wants to close their exposure to the vulnerability.”
Back to top
View user's profile Send private message
PeterPotkay
PostPosted: Fri Oct 24, 2014 5:41 am Post subject: Reply with quote

Poobah

Joined: 15 May 2001
Posts: 7722

tczielke wrote:
I did open a PMR to get some clarity to my question on if a SSL v3 cipher like RC4_MD5_US (which I think is non-CBC) is susceptible to POODLE. This was the response.

“The vulnerability is specifically within the SSLv3 protocol, thus that protocol must not be used if the customer wants to close their exposure to the vulnerability.”


I would be more confident in that PMR response if they went on to clarify whether non-CBC is susceptible or not. To be fair, that is probably more detailed then they need or want to be on this topic - just get off any and all SSL and let's move on is the thinking of most. The question would be better directed at an SSL expert...curious minds want to know.
_________________
Peter Potkay
Keep Calm and MQ On
Back to top
View user's profile Send private message
mqjeff
PostPosted: Fri Oct 24, 2014 5:45 am Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

PeterPotkay wrote:
tczielke wrote:
I did open a PMR to get some clarity to my question on if a SSL v3 cipher like RC4_MD5_US (which I think is non-CBC) is susceptible to POODLE. This was the response.

“The vulnerability is specifically within the SSLv3 protocol, thus that protocol must not be used if the customer wants to close their exposure to the vulnerability.”


I would be more confident in that PMR response if they went on to clarify whether non-CBC is susceptible or not. To be fair, that is probably more detailed then they need or want to be on this topic - just get off any and all SSL and let's move on is the thinking of most. The question would be better directed at an SSL expert...curious minds want to know.


"Specifically within the SSLv3 Protocol" means "it doesn't matter what cipher you use, the exchange of ciphers and the securing of the channel itself is vulnerable".

That is, that some part of the handshaking/identifying process is vulnerable to hacking.
Back to top
View user's profile Send private message
PeterPotkay
PostPosted: Mon Oct 27, 2014 3:57 am Post subject: Reply with quote

Poobah

Joined: 15 May 2001
Posts: 7722

Here's the update from IBM for WMB/IIB.

http://www-01.ibm.com/support/docview.wss?uid=swg21687678&myns=swgws&mynp=OCSSNQK6&mynp=OCSSHL3F&mynp=OCSSKM8N&mync=E
_________________
Peter Potkay
Keep Calm and MQ On
Back to top
View user's profile Send private message
samsansam
PostPosted: Thu Oct 30, 2014 8:08 pm Post subject: Reply with quote

Apprentice

Joined: 19 Mar 2014
Posts: 41

so if we are not using SSL at all , do we have to care about POODLE?

We have MQ 7.0.1
Back to top
View user's profile Send private message
fjb_saper
PostPosted: Thu Oct 30, 2014 9:01 pm Post subject: Reply with quote

Grand High Poobah

Joined: 18 Nov 2003
Posts: 20756
Location: LI,NY

samsansam wrote:
so if we are not using SSL at all , do we have to care about POODLE?

We have MQ 7.0.1

So I figure you're not using any server connection channels without security exits either right?
_________________
MQ & Broker admin
Back to top
View user's profile Send private message Send e-mail
samsansam
PostPosted: Thu Oct 30, 2014 9:47 pm Post subject: Reply with quote

Apprentice

Joined: 19 Mar 2014
Posts: 41

Sound not secure , but we do use server connection channels without security exits.

I know how sound stupid that , but I just join the company
Back to top
View user's profile Send private message
mqjeff
PostPosted: Fri Oct 31, 2014 4:44 am Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

SSL in MQ serves two purposes. To allow you to verify the identity of the remote end, and to ensure that traffic moving across the wire can not be read.

If you only need to do the first thing, and not the second thing, then channel exits are just fine and count as "secure" under your local criteria.

If you are not using SSL at all, I am not sure if your queue managers are vulnerable to POODLE or not. I don't know what the queue manager would do if it has SSL as OPTIONAL and someone makes an SSLV3 connection.
Back to top
View user's profile Send private message
smdavies99
PostPosted: Fri Oct 31, 2014 10:20 am Post subject: Reply with quote

Jedi Council

Joined: 10 Feb 2003
Posts: 6076
Location: Somewhere over the Rainbow this side of Never-never land.

samsansam wrote:
Sound not secure , but we do use server connection channels without security exits.

I know how sound stupid that , but I just join the company


What if your network is triple firewalled from the Internet plus each subnet is firewalled from every other subnet AND only the required ports are open AND the queue managers are configured to accept incoming SVRCONN connetions from know IP Addresses. ***
Plus NO personal or Financial data is carried.

Do you use SSL(TLS) + Exits or leave the data open and unencrypted?

Is the QMGR Secure or insecure?

What I'm trying to say is that each and every system is different from every other and needs to be judged accordingly.

***
That said we have a customer asking for hardware encryption everywhere in the plant including every sensor device. They even want to encrypt SNMP messages. It will add at least $5M to the project price (if it could be done at all). So far they have not baulked at the cost because they have oodles of oil money to spend.
_________________
WMQ User since 1999
MQSI/WBI/WMB/'Thingy' User since 2002
Linux user since 1995

Every time you reinvent the wheel the more square it gets (anon). If in doubt think and investigate before you ask silly questions.
Back to top
View user's profile Send private message
Display posts from previous:
Post new topicReply to topic Goto page Previous  1, 2 Page 2 of 2

MQSeries.net Forum IndexIBM MQ SecurityMQ, SSL and the POODLE attack
Jump to:



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
Protected by Anti-Spam ACP


Theme by Dustin Baccetti
Powered by phpBB 2001, 2002 phpBB Group

Copyright MQSeries.net. All rights reserved.