TN3270 Security Enhancements



Similar documents
z/os Firewall Technology Overview

CS z/os Network Security Configuration Assistant GUI

Exploiting the Web with Tivoli Storage Manager

OS/390 Firewall Technology Overview

Cornerstones of Security

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

RemotelyAnywhere Getting Started Guide

ERserver. iseries. Securing applications with SSL

IBM Communications Server for AIX, V6

Network Configuration Settings

Citrix MetaFrame XP Security Standards and Deployment Scenarios

ERserver. iseries. Secure Sockets Layer (SSL)

Implementing Secure Sockets Layer on iseries

RLP Citrix Setup Guide

IBM Remote Lab Platform Citrix Setup Guide

OS/390 Firewall Technology Overview

Chapter 7 Transport-Level Security

CTS2134 Introduction to Networking. Module Network Security

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

7.1. Remote Access Connection

UBS KeyLink Quick reference WEB Installation Guide

Elluminate Live! Access Guide. Page 1 of 7

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

How To Configure SSL VPN in Cyberoam

SSL SSL VPN

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Load Balancing for enetwork Communications Servers

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Elluminate Live! Access Guide. Page 1 of 7

introducing The BlackBerry Collaboration Service

Enabling SSL and Client Certificates on the SAP J2EE Engine

Security. TestOut Modules

Angel Dichev RIG, SAP Labs

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Security Digital Certificate Manager

Chapter 17. Transport-Level Security

SQL Server 2008 and SSL Secure Connection

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

Implementing Secure Sockets Layer (SSL) on i

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

Network Security Essentials Chapter 5

A Guide to New Features in Propalms OneGate 4.0

S y s t e m A r c h i t e c t u r e

Citrix Access on SonicWALL SSL VPN

TCP/IP Loggingontoa remote computer (Telnet)

BROWSER AND SYSTEM REQUIREMENTS

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

IBM Web Server for OS/390 History

Security Digital Certificate Manager

How to Secure Mainframe FTP

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0

Configuring Security Features of Session Recording

Networking Security IP packet security

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v

Tel: Toll-Free: Fax: Oct Website: CAIL Security Facility

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

The Secure Sockets Layer (SSL)

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

DMZ Network Visibility with Wireshark June 15, 2010

How Secure are your Channels? By Morag Hughson

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department

GoToMyPC Corporate Advanced Firewall Support Features

Using hp OpenView Omniback II GUI Via Slow Remote Connections

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

athenahealth Interface Connectivity SSH Implementation Guide

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Security IIS Service Lesson 6

Lab Developing ACLs to Implement Firewall Rule Sets

DreamFactory Security Whitepaper Customer Information about Privacy and Security

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

IBM WebSphere Host On-Demand:

Cisco Which VPN Solution is Right for You?

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

IBM enetwork VPN Solutions

Deployment Guide Oracle Siebel CRM

Networking File Transfer Protocol

Network Access Security. Lesson 10

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Steelcape Product Overview and Functional Description

Yale Software Library

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Password Reset PRO INSTALLATION GUIDE

Prestige 314 Read Me First

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Transcription:

TN3270 Security Enhancements SecureWay Communication Server for OS/390 Copyright IBM Corporation, 1999 1

Support in OS/390 V2.R6 Copyright IBM Corporation, 1999 2

Secure Sockets Layer - What is it? Application Application SSL SSL TCP TCP IP IP Data Link Data Link Provides authentication, integrity, and data privacy above TCP layer. Protocol includes key exchange using public key cryptography and negotiation of security parameters Applications must be changed to use SSL Applications that use SSL: Websphere TN3270 Server Copyright IBM Corporation, 1999 3

TCP/IP SSL Enabling for TN3270 Secure TN3270 data exchange SSL server side authentication support using X.509 Certificates Client authentication done with userid/password over encrypted session Uses SSL protocols to authenticate and set up shared secrets for encryption of data DES and Triple DES for data encryption TCP/IP Other Intranet Servers TN3270 Server SNA Enterprise Servers Direct TN3270 Support for SSL Clients Host on Demand, PComm HPR & IP Sysplex Allows Multiple TN3270 Ports per Server 255 max Basic Ports SSL-Only TN3270 SSL Client (e.g., HOD) Router IBM FEP or Router TN3270 Client TN3270 Client Copyright IBM Corporation, 1999 4

TELNET Parameters for SSL TCPIP Profile Enhancements: TELNETPARMS SECUREPORT 2323 KEYRING HFS /u/graaff/telnet.kdb ENCRYPT SSL_DES_SHA ENDENCRYPT SSLTIMEOUT 30 (time-out in seconds) ENDTELNETPARMS TELNETPARMS SECUREPORT 2323 KEYRING MVS graaff.telnet.kdb ENCRYPT SSL_DES_SHA ENDENCRYPT SSLTIMEOUT 30 (time-out in seconds) ENDTELNETPARMS Copyright IBM Corporation, 1999 5

Supported Encryption Algorithms SSL V3 Cipher Suite HTCP350 (base) JTCP35T (RC2/4) JTCP35L (DES) JTCP35K (TDES) SSL_NULL-Null Y Y Y Y SSL_NULL_MD5 Y Y Y Y SSL_NULL_SHA Y Y Y Y SSL_RC4_MD5_EX Y Y Y SSL_RC4_MD5 SSL_RC4_SHA Y Y SSL_RC2_MD5_EX Y Y Y SSL_DES_SHA Y Y SSL_3DES_SHA * Y Copyright IBM Corporation, 1999 6

Key Management TELNET SSL Key Management functions performed by a utility called MKKF Create KEYRING File Loaded with Well known Certificate Authorities (e.g. Verisign) Create Self Signed Certificate Import Certificate Request signed by external Certificate Authority Copyright IBM Corporation, 1999 7

Separate Port For Secure Internet Access Port 23 not allowed Internet Firewall 2nd Secure Port Enterprise Network or Intranet Port 23 One possible configuration using separate ports... SSL TN3270 negotiations are always initiated over a specified secure port Can be a separate port Configuration flexibility Can filter all non-ssl traffic at Firewall based on port Firewall allows only SSL TN3270 traffic access based on secure port Access to non-ssl port from intranet only Copyright IBM Corporation, 1999 8

Host on Demand Copyright IBM Corporation, 1999 9

Host On Demand A Java-based applet for browser access to 3270, 5250, VT100 and VT220 hosts. AS/400 S/390 Appl. Server DEC SNAor TCP/IP Intranet HP Sun NT Web Server Internet Comm Server Comm Server Web Browser Host On Demand LAN Intranet Extranet Host On Demand Web Browser Host On Demand Web Browser Copyright IBM Corporation, 1999 10

Server and Client configurations OS/390 OS/400 Win95/NT HP-UX NC's Servers NT, OS/2, NETWARE, SOLARIS AIX,LINUX, HP/UX Host On Demand Web Served Cached install Client install Clients OS/2, Mac AIX Copyright IBM Corporation, 1999 11

Flexible Achitecture Full support for standard TNXXXX protocol Delivers ability to communicate directly with any TN Server TNXXXX protocol fully implemented at client flexibility to use 2 or 3 tier network configuration Host/TNServer Host/TNServer TNXXXX HOD Server TNServer TNXXXX TNXXXX -OR- 2Tier Simpler configuration: fewer points of failure 3Tier More control Copyright IBM Corporation, 1999 12

Server Host On Demand server Emulator configuration Default sessions User management User IDs, passwords Redirector Lets clients connect to any Telnet server/host system with any browser Supports SSL security - on Win32 and AIX Express server Provides compression (with Express Client) Publications Administrator's Guide, Helps, README Host Access Class Library - Java API Must reside in the same machine as a Web server Can co-reside with a communications server Copyright IBM Corporation, 1999 13

Clients Cached client (HODLocal.htm) Downloaded from a server the first time Cached on client workstation, loaded locally thereafter Checks for updated version at each load Strict browser requirements Downloaded client (HOD.htm) From the server, every time Needs only a browser - no code installed Locally-installed client For remote sites, probably dial-in Express provides compression = performance Windows 95 & NT, AIX, HP UX Copyright IBM Corporation, 1999 14

How It Works Download Client Applet Download (HTTP) Web Server Telnet Servers Host On-Demand Server Locally- Installed Client Telnet Sessions Redirector Express Server S/390 AS/400 ASCII CS NetWare Express Client Compression Clients (except Express) can connect directly to Telnet servers if they use a browser that has signed-applet support. SSL Optional Copyright IBM Corporation, 1999 15

16

HOD V4 Configuration Connection Tab specifies : - Destination Address - Destination Port - LU name or Pool - Screen Size Copyright IBM Corporation, 1999 17

HOD Security Configuration Security Tab specifies : - SSL Enablement - SSL Server Authentication - SSL Client Authentication (discussed later) Copyright IBM Corporation, 1999 18

3270 Session Window Example + means SSL connected Copyright IBM Corporation, 1999 19

Personal Communications Copyright IBM Corporation, 1999 20

SSL Support in Personal Communications Note: SSL Support is in Personal Communications 4.3 Copyright IBM Corporation, 1999 21

TN3270 SSL Support in OS/390 2.8 Copyright IBM Corporation, 1999 22

TN3270 SSL Client Authentication Protects SNA and S/390 resources using digital certificate technology Tightens security for TN3270 access to corporate intranet Client credentials are validated before USSMSG (logon screen) is sent Security Levels Provided SSL Client Authentication Provides authentication of client side certificates Pre-login access control using RACF digital certificate support Client certificate stored in RACF New RACF Class for TN3270 access - SERVAUTH <Certificate mapped to RACF user ID and userid must be permitted to use SERVAUTH TN3270 resource> Client support in release 4 of Host on-demand and future release of PComm TCP/IP TN3270 SSL Client (e.g. HOD) TN3270 Server TN3270 SSL Client (e.g., HOD) Client Certificates stored in RACF SNA IBM Parallel Sysplex TN3270 SSL Client (e.g. HOD) Copyright IBM Corporation, 1999 23

TN3270 Parameters for SSL New parameters in 2.8 CLIENTAUTH in support of SSL Client Authentication NONE SSLCERT SAFCERT No Client Authentication Verifies client has a certificate from a trusted Certificate Authority Verifies client certificate has an associated RACF user ID before presenting the Telnet USSMSG screen. A additional security check is performed against a profile in the RACF CLASS SERVAUTH, to check if the associated RACF user ID is authorized to open the port: EZB.TN3270.sysname.tcpname.PORTnnnnn Copyright IBM Corporation, 1999 24

RACF Telnet Port Access Control RACF Intranet Telnet server Internet Telnet Server Intranet Telnet Server Port 23 Port 2323 Port 3323 CS OS/390 TCP/IP Stack RACF Telnet Port Controls user access to a Telnet port is considered a resource in the RACF SERVAUTH class IP Router IBM IBM IP Network IBM IP Router Copyright IBM Corporation, 1999 25

Supported Encryption Algorithms SSL V3 Cipher Suite HTCP380 (base security) JTCP383 (LEVEL1) JTCP382 (LEVEL 2) JTCP38K (LEVEL 3) SSL_NULL-Null Y Y Y Y SSL_NULL_MD5 Y Y Y Y SSL_NULL_SHA Y Y Y Y SSL_RC4_MD5_EX Y Y Y SSL_RC4_MD5 SSL_RC4_SHA Y Y SSL_RC2_MD5_EX Y Y Y SSL_DES_SHA Y Y SSL_3DES_SHA Y Copyright IBM Corporation, 1999 26

Key Management TN3270 Server utilizes System SSL in 2.8 Key Management done through utility GSKKYMAN Create/Migrate Keyring File Loaded with Well known Certificate Authorities (e.g. Verisign) Create Self Signed Certificate Import Certificate Request signed by external Certificate Authority Copyright IBM Corporation, 1999 27

Host on Demand Client Authentication Copyright IBM Corporation, 1999 28

SSL Client Authentication - Configuration New Security tab on Session configuration Identifies default location of client certificate Client may override on receipt of Server Requesting Certificate message Copyright IBM Corporation, 1999 29

SSL Client Authentication - Request Client certificate stored inafileinapkcs12format Password associated with the exported certificate Copyright IBM Corporation, 1999 30

Security Item Copyright IBM Corporation, 1999 31

Secure Connection Security Window Copyright IBM Corporation, 1999 32