ASG
IBM
Zystems
Cressida
Icon
Netflexity
 
  MQSeries.net
Search  Search       Tech Exchange      Education      Certifications      Library      Info Center      SupportPacs      LinkedIn  Search  Search                                                                   FAQ  FAQ   Usergroups  Usergroups
 
Register  ::  Log in Log in to check your private messages
 
RSS Feed - WebSphere MQ Support RSS Feed - Message Broker Support

MQSeries.net Forum Index » WebSphere Message Broker (ACE) Support » Quality of message protection

Post new topic  Reply to topic
 Quality of message protection « View previous topic :: View next topic » 
Author Message
lanny boy
PostPosted: Mon Oct 17, 2005 7:28 am    Post subject: Quality of message protection Reply with quote

Voyager

Joined: 24 Nov 2003
Posts: 79
Location: UK

I have been looking at the security/integrity of messages being processed by the broker.

The documentation states that...
Quote:
The authentication services provided by WebSphere Business Integration Message Broker ensure that only legitimate event broker servers and clients can connect to each other. However, a hacker might still be able to observe messages in transit or tamper with messages on established connections


Obviously this implies that there is a risk of tampering as with any other electronic transfer of data.

Has anybody any experience of this knd of threat?

There doesn't seem to be much that can be done about this or am i wrong? Maybe the enableQopSecurity parameter of mqsicchangeproperties cmd?
Does this apply to only pub/sub functionality or useful in securing the integrity of data?

Any feedback would be great.
Back to top
View user's profile Send private message
jefflowrey
PostPosted: Mon Oct 17, 2005 7:37 am    Post subject: Reply with quote

Grand Poobah

Joined: 16 Oct 2002
Posts: 19981

If you wish to secure MQ messages in transit, you should enable SSL on all of your MQ channels, particularly client channels.

It gets a little bit harder to secure HTTP messages to/from broker using SSl, but you can probably use something like STunnel to do this (or migrate to v6 and set the HTTPInput nodes to use SSL).

I don't know about securing MQRealTime. I think this is covered, thoguh.
_________________
I am *not* the model of the modern major general.
Back to top
View user's profile Send private message
lanny boy
PostPosted: Mon Oct 17, 2005 7:47 am    Post subject: Reply with quote

Voyager

Joined: 24 Nov 2003
Posts: 79
Location: UK

Hi Jeff,

Thanks for your reply.

It's not so much messages in transit between QM's i am concerned about, as SSL would solve this problem.

However is it possible to tamper with messages being moved from local Queue A to Queue B on the same QM, by the broker???

IF this is a risk are there any security steps which could be taken to minimise this. I personally don't the feel the risk is very real but I need to reassure other people as well!!
Back to top
View user's profile Send private message
jefflowrey
PostPosted: Mon Oct 17, 2005 7:57 am    Post subject: Reply with quote

Grand Poobah

Joined: 16 Oct 2002
Posts: 19981

Messages don't move from qlocal to qlocal except by way of an application.

The only way to tamper with messages on a queue is to get them, edit them, and put them back. (or spend an incredible amount of time learning how to edit the queue data files, and then find out how to hack the qmgr server to get access to those files). Most organizations make it difficult to load applications onto servers, so it's usually very difficult to sneak apps that use bindings connections onto a machine.

SSL is not just for securing transport between two queue managers. It's an excellent way to secure your QM itself. If all channels have SSL on them, particularly svrconns, then only machines that have the right certs can access the qm. This will also prevent rogue client apps from getting to messages on a queue.

If you really need to do something more, you can use an API crossing exit or some such to encrypt and decrypt messages on the fly. But this is expensive, complicated and still subject to some vulnerability.

But remember that the security of a system is equal to the least secure piece.

Likely, the QOP of your messages is not the largest vulnerability you need to worry about.
_________________
I am *not* the model of the modern major general.
Back to top
View user's profile Send private message
kingsley
PostPosted: Mon Oct 17, 2005 9:04 am    Post subject: Reply with quote

Disciple

Joined: 30 Sep 2001
Posts: 175
Location: Hursley

I would suggest you to encrypt the message at the application level before placing it on the Queue.

That ensures even the hacker can't hack.


The downside of it is, if you are sending the messages across Operating systems, then the same decryption tool should be used and conversion has to be done when the message crosses the platform. The scenario is too dangerous for messages reaching and moving out of Z/OS.
Back to top
View user's profile Send private message Visit poster's website
hopsala
PostPosted: Mon Oct 17, 2005 10:17 am    Post subject: Reply with quote

Guardian

Joined: 24 Sep 2004
Posts: 960

kingsley wrote:
I would suggest you to encrypt the message at the application level before placing it on the Queue.

I personally do not favour this solution, but would rather harden security settings using setmqaut and SSL-configured channels; if you've done this properly, you've already ensured that "even the hacker can't hack" your data or setup. And concerning using both approaches together, contrary to common opinion, I do not believe that doubling your security layers is worth it, except maybe in truely problematic environments (i.e the army and such); it is usually more work then it's worth, aside from adding complexity to the system, since admistration becomes much more cumbersome (deadq handlers have to use decryption etc).

There is also a strange but somewhat common phenomenon i've seen in a number of sites i've consulted - when investing time encrypting the messages, less time is spent hardening local security, and thus systems remain wide-open access-wise with encrypted messages. This situation is worse than the opposite (normal msgs, no access) since the hacker can quickly log in, take a bunch of messages, and scurry out, decrypting msgs at his leisure; while in the opposite scenario he has to remain connected for the duration of the hack, which is far riskier and prone to detection.
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic  Reply to topic Page 1 of 1

MQSeries.net Forum Index » WebSphere Message Broker (ACE) Support » Quality of message protection
Jump to:  



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
Protected by Anti-Spam ACP
 
 


Theme by Dustin Baccetti
Powered by phpBB © 2001, 2002 phpBB Group

Copyright © MQSeries.net. All rights reserved.