ASG
IBM
Zystems
Cressida
Icon
Netflexity
 
  MQSeries.net
Search  Search       Tech Exchange      Education      Certifications      Library      Info Center      SupportPacs      LinkedIn  Search  Search                                                                   FAQ  FAQ   Usergroups  Usergroups
 
Register  ::  Log in Log in to check your private messages
 
RSS Feed - WebSphere MQ Support RSS Feed - Message Broker Support

MQSeries.net Forum Index » General IBM MQ Support » The same kdb form multiple mq client installations

Post new topic  Reply to topic Goto page 1, 2  Next
 The same kdb form multiple mq client installations « View previous topic :: View next topic » 
Author Message
kordi
PostPosted: Thu Oct 29, 2015 6:50 am    Post subject: The same kdb form multiple mq client installations Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

Hi,

Providing I have tool which operates on 30 hosts under the same username everywhere connecting the same QMGR. Is it right to use the same kdb for all of these mq clients on these 30 hosts?
Back to top
View user's profile Send private message
exerk
PostPosted: Thu Oct 29, 2015 7:46 am    Post subject: Reply with quote

Jedi Council

Joined: 02 Nov 2006
Posts: 6339

My feeling is no as irrespective of the fact of compromise, should the key store be corrupted in any way, or deleted 'accidentally', then all clients stop working.

Watch this space for other's ideas...
_________________
It's puzzling, I don't think I've ever seen anything quite like this before...and it's hard to soar like an eagle when you're surrounded by turkeys.
Back to top
View user's profile Send private message
kordi
PostPosted: Thu Oct 29, 2015 7:53 am    Post subject: Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

In fact, I would have 30 copies of the key database. If one would get damaged, I could use one of remaining 29 copies located on different 29 servers
Back to top
View user's profile Send private message
Vitor
PostPosted: Thu Oct 29, 2015 8:23 am    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

kordi wrote:
In fact, I would have 30 copies of the key database. If one would get damaged, I could use one of remaining 29 copies located on different 29 servers


I hope you've got a really good SSL management system for when the certificates expire.
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
fjb_saper
PostPosted: Thu Oct 29, 2015 8:27 am    Post subject: Reply with quote

Grand High Poobah

Joined: 18 Nov 2003
Posts: 20756
Location: LI,NY

Each client / user should have it's own Keystore/truststore.
Each app should have its own channel.
You only need the signer cert chain on the qmgr. If this is internal have them all signed by the internal CA (no cost).
_________________
MQ & Broker admin
Back to top
View user's profile Send private message Send e-mail
kordi
PostPosted: Fri Oct 30, 2015 12:04 am    Post subject: Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

Gentelmen, I think I have been misunderstood.

Each mq client would have its own kdb obviously. I am not talking about shared key.kdb.

What I am not sure about is if I can use the same certificate for many mq clients if those clients are operating using the same user id?

So I would copy key.kdb to temp folder, delete old certificate with label ibmwebspheremq<userID>, create signing request for ibmwebspheremq<userID> with the same DN as old one, sent to sign, receive newly signed certificate and add CA certs. After that I would replace all 30 kdb stores with this new one having new certificate for userID.

I guess it should work assuming all clients are using the same userID but maybe there is something which I don't know and would cause problems.
Back to top
View user's profile Send private message
exerk
PostPosted: Fri Oct 30, 2015 1:13 am    Post subject: Reply with quote

Jedi Council

Joined: 02 Nov 2006
Posts: 6339

kordi wrote:
Gentelmen, I think I have been misunderstood.

Each mq client would have its own kdb obviously. I am not talking about shared key.kdb...

Whether it's one key store file or thirty copies of the same key store, it's not a good idea. What happens if the certificate is revoked?
_________________
It's puzzling, I don't think I've ever seen anything quite like this before...and it's hard to soar like an eagle when you're surrounded by turkeys.
Back to top
View user's profile Send private message
kordi
PostPosted: Fri Oct 30, 2015 1:22 am    Post subject: Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

Yes, this is possible threat which may impact all client connections however we are using internal CA, so I think that will not happen.
Back to top
View user's profile Send private message
exerk
PostPosted: Fri Oct 30, 2015 1:46 am    Post subject: Reply with quote

Jedi Council

Joined: 02 Nov 2006
Posts: 6339

kordi wrote:
Yes, this is possible threat which may impact all client connections however we are using internal CA, so I think that will not happen.

So the internal CA doesn't revoke any certificates?
_________________
It's puzzling, I don't think I've ever seen anything quite like this before...and it's hard to soar like an eagle when you're surrounded by turkeys.
Back to top
View user's profile Send private message
kordi
PostPosted: Fri Oct 30, 2015 2:01 am    Post subject: Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

Does not have any reason to do that.
Back to top
View user's profile Send private message
Vitor
PostPosted: Fri Oct 30, 2015 4:24 am    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

kordi wrote:
Does not have any reason to do that.


So there's no chance at all that a security breach (someone being phished) will result in a certificate being stolen? Or a certificate being fraudulently obtained in some other way?

I admire your security standards and staff training procedures. That's a proud statement you're making.
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
kordi
PostPosted: Fri Oct 30, 2015 5:30 am    Post subject: Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

All of the connections are within internal network, to all servers limited staff have access. Of course we can assume that certificate can be stolen but in the same way we may assume Queue Managers can be deleted, servers wiped out, data base droped etc. We have to trust administrators having access to certain resources that they won't do any harm to the system they maintain. Otherwise administrators work would be impossible.
Back to top
View user's profile Send private message
Vitor
PostPosted: Fri Oct 30, 2015 6:04 am    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

kordi wrote:
We have to trust administrators having access to certain resources that they won't do any harm to the system they maintain. Otherwise administrators work would be impossible.


So you trust administrators not to do any harm, including accidentally? So you don't take backups because you trust the administrators not to delete queue managers or dismount servers?

Of course you take backups because sometimes accidents happen and you use backups as a remediation. In the same way an administrator can accidently click on a link they shouldn't and bang goes your security. The remediation is revocation.

I repeat my comments about cert management. Even if you do never revoke a certificate, sooner or later they'll expire.
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
kordi
PostPosted: Wed Nov 04, 2015 6:21 am    Post subject: Reply with quote

Centurion

Joined: 28 May 2012
Posts: 146
Location: PL

Of course we do make backups because problem may be caused not only by us but also by hardware failure or SA's mistake.

Maybe my knowledge is limited but can you please describe me a scenario which may force us to revoke certificate issued for internal purpose, inside intranet network? I would appreciate it. I am just curious how likely this situation is.

Yes, all certificates have expatriation date, regardless if you are using the same on hundreds of servers or hundreds on the same server. This have to be maintain anyway.
Back to top
View user's profile Send private message
Vitor
PostPosted: Wed Nov 04, 2015 6:26 am    Post subject: Reply with quote

Grand High Poobah

Joined: 11 Nov 2005
Posts: 26093
Location: Texas, USA

kordi wrote:
can you please describe me a scenario which may force us to revoke certificate issued for internal purpose, inside intranet network?


One of the administrators falls victim to a phising or spear phising email, granting an attacker access to the internal certificates and hence the ability to impersonate or otherwise access your network.

Other attack vectors are of course possible.
_________________
Honesty is the best policy.
Insanity is the best defence.
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic  Reply to topic Goto page 1, 2  Next Page 1 of 2

MQSeries.net Forum Index » General IBM MQ Support » The same kdb form multiple mq client installations
Jump to:  



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
Protected by Anti-Spam ACP
 
 


Theme by Dustin Baccetti
Powered by phpBB © 2001, 2002 phpBB Group

Copyright © MQSeries.net. All rights reserved.