ASG
IBM
Zystems
Cressida
Icon
Netflexity
 
  MQSeries.net
Search  Search       Tech Exchange      Education      Certifications      Library      Info Center      SupportPacs      LinkedIn  Search  Search                                                                   FAQ  FAQ   Usergroups  Usergroups
 
Register  ::  Log in Log in to check your private messages
 
RSS Feed - WebSphere MQ Support RSS Feed - Message Broker Support

MQSeries.net Forum Index » WebSphere Message Broker (ACE) Support » Selective security on web services

Post new topic  Reply to topic
 Selective security on web services « View previous topic :: View next topic » 
Author Message
Vitor
PostPosted: Mon Feb 23, 2015 11:29 am    Post subject: Selective security on web services Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

IIBv9.0.0.2
RHEL 5.something

We have a perfectly happy set up where we have 1-n flows using HTTPS, with the key infrastructure as laid out in the InfoCenter and the keys signed by an internal CA. We are content because all the IIB sits behind walls of DataPower and other network appliances, and you couldn't see our IIB from the public internet with a telescope.

As part of the latest paranoid attempt to make my life complex, the site has recently decreed that no SSL shall be used; only TLS is acceptable. Again, we're talking about systems inside the walls not customers with web browsers; they at least are not my problem. Now using TLS with IIB is fine, but now I've been instructed to enforce this by refusing connections to SOAPInput nodes that don't use TLS. According to this, if I issue:

Code:

mqsichangeproperties PoorMisusedBroker -e DumpForDubuiousCode -o HTTPSConnecter -n sslProtocol -v TLS


then the default becomes TLS rather than SSL, but SSL is still allowed. A small amount of experimentation seems to confirm this.

I've attempted further research, and rapidly ended up to my waist in the IBM Java JSSE specification.

- Is there a simple way to turn off all non-TLS communication, i.e.:
Code:

mqsichangeproperties PoorMisusedBroker -e DumpForDubuiousCode -o HTTPSConnecter -n SSLAllowed -v false
or
Code:
mqsichangeproperties PoorMisusedBroker -e DumpForDubuiousCode -o HTTPSConnecter -n TLSOnly -v true


- Is there a way to "sabotage" the broker's verification process so only TLS specs handshake correctly with the SOAPInput node? There's apparently no requirement to be nice, or return any helpful messages to the client, just to demonstrate that insecure cipher specs can't be used to connect to our end points.
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
mqjeff
PostPosted: Mon Feb 23, 2015 11:36 am    Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

I would look for the technote/etc that described the relationship of IIB to the POODLE defect to see if there's a recommendation.

the only thing off the top of my head that I can think of is to set the ciphers to only allow TLS ciphers and not SSL ciphers. But that might still be exposed to POODLE.
Back to top
View user's profile Send private message
Vitor
PostPosted: Mon Feb 23, 2015 11:37 am    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

mqjeff wrote:
the only thing off the top of my head that I can think of is to set the ciphers to only allow TLS ciphers and not SSL ciphers. But that might still be exposed to POODLE.


I don't think internally we're worried at this point about stray dogs; others here care about such things.

Do you have a link for how one would set the ciphers as you suggest?
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
mqjeff
PostPosted: Mon Feb 23, 2015 11:42 am    Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

http://www-01.ibm.com/support/knowledgecenter/SSMKHH_9.0.0/com.ibm.etools.mft.doc/an09148_.htm

-n ciphers

Values? dunno.

presumably anything with TLS in it.

The point about POODLE is that I expect there are actually real instructions in whatever technote mentions it, to disable SSLV3.
Back to top
View user's profile Send private message
Vitor
PostPosted: Mon Feb 23, 2015 12:54 pm    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

mqjeff wrote:
http://www-01.ibm.com/support/knowledgecenter/SSMKHH_9.0.0/com.ibm.etools.mft.doc/an09148_.htm

-n ciphers

Values? dunno.

presumably anything with TLS in it.

The point about POODLE is that I expect there are actually real instructions in whatever technote mentions it, to disable SSLV3.


Bless you.

I actually knew that, and had a "Doh!" moment when I saw your link. I blame weather related brain freeze.
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
mqjeff
PostPosted: Mon Feb 23, 2015 12:59 pm    Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

Vitor wrote:
I blame weather related brain freeze.

Oh? is it cold where you are?
Back to top
View user's profile Send private message
fjb_saper
PostPosted: Mon Feb 23, 2015 1:09 pm    Post subject: Reply with quote

Grand High Poobah

Joined: 18 Nov 2003
Posts: 20696
Location: LI,NY

Check all existing attributes and find out the way to restrict the ciphers...
TLS* might work?? From memory it's a comma separated list? I wonder if they put all the elliptic curve ones in the same category...

The list of ciphers is here http://www-01.ibm.com/support/knowledgecenter/SSYKE2_6.0.0/com.ibm.java.security.component.60.doc/security-component/jsse2Docs/ciphersuites.html.

Apparently there is no easy way to enforce fips either unless you limit the ciphers...



_________________
MQ & Broker admin


Last edited by fjb_saper on Mon Feb 23, 2015 1:26 pm; edited 1 time in total
Back to top
View user's profile Send private message Send e-mail
Vitor
PostPosted: Mon Feb 23, 2015 1:23 pm    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

mqjeff wrote:
Vitor wrote:
I blame weather related brain freeze.

Oh? is it cold where you are?


Grrr........
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
paustin_ours
PostPosted: Mon Feb 23, 2015 1:33 pm    Post subject: Reply with quote

Yatiri

Joined: 19 May 2004
Posts: 667
Location: columbus,oh

Quote:
A small amount of experimentation seems to confirm this


can you shed some light on how to test this?
Back to top
View user's profile Send private message Yahoo Messenger
Vitor
PostPosted: Tue Feb 24, 2015 5:45 am    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

paustin_ours wrote:
Quote:
A small amount of experimentation seems to confirm this


can you shed some light on how to test this?


I called a web service using a client that specified an SSLv3 rather than a TLS spec. Even with the property set to "TLS", the client sucessfully achieved a handshake and used the web service. The same client with a TLS spec worked, but failed with the property set to "SSL" (as expected).
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
mqjeff
PostPosted: Wed Feb 25, 2015 12:32 pm    Post subject: Reply with quote

Grand Master

Joined: 25 Jun 2008
Posts: 17447

http://www-01.ibm.com/support/docview.wss?uid=swg21687678
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic  Reply to topic Page 1 of 1

MQSeries.net Forum Index » WebSphere Message Broker (ACE) Support » Selective security on web services
Jump to:  



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
Protected by Anti-Spam ACP
 
 


Theme by Dustin Baccetti
Powered by phpBB © 2001, 2002 phpBB Group

Copyright © MQSeries.net. All rights reserved.