1. Trang chủ >
  2. Công Nghệ Thông Tin >
  3. An ninh - Bảo mật >

1 SSL/TLS support in OS/400

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.81 MB, 506 trang )


SSL enabled application



Server

authentication



Client

authentication



HTTP Server (Original) and

(powered by Apache)



X



X



Java applications



X



LDAP Directory Services Server



X



X (New)



LDAP Directory Services Client



X (New)



X (New)



LDAP Directory Services Publishing



X



X (New)



Webserver Search Engine



X (New)



OS/400 TCP/IP Telnet Server 2 3



X



X (Changed)



OS/400 TCP/IP FTP Server 3



X (New)



X (New)



OS/400 Cluster Security



X (New)



X (New)



1



Client Access Express allows SSL protection based on single remote connections.

User-written applications that use Client Access Express APIs can also be protected

by SSL.



2



Currently the IBM Personal Communications V.5.0 product, the 5250 emulation of

the Client Access Express product, and Host On-Demand support the configuration

for SSL connections. Client authentication is supported in V5R1 5250 Emulation,

PCOMM V.5.0, and Host On-Demand 4.0 and higher.



3



SSL is supported only for the server application. The OS/400 TCP/IP Telnet and FTP

client do not support SSL yet. Client authentication for these server applications

requires that the certificates presented by the client are associated with an OS/400

user profile.



5.2 Enabling SSL for Telnet

The OS/400 TCP/IP Telnet server supports both server and client

authentication. There are three major Telnet client products that support SSL

with client authentication:

• PC5250 included in the Client Access Express

• IBM Personal Communications V5.0

• IBM WebSphere Host On-Demand

You can find more information on how to enable the Host On-Demand

client for client authentication in IBM SecureWay Host On-Demand 4.0:

Enterprise Communications in the Era of Network Computing, SG24-2149.



284



iSeries Wired Network Security



Enabling client authentication for the Telnet server requires all clients to

present a certificate during SSL session establishment. The certificate must

be associated with an OS/400 user profile. In this case, clients that do not

support client authentication cannot connect to the secure Telnet server.

However, if configured, unsecure connections can still be established through

the Telnet server port 23.

The following table shows the port numbers used for Telnet connections.

Table 8. The Telnet server port numbers



Connection



Port number



Service name



No SSL



23



telnet



SSL



992



telnet-ssl



Implementation tasks overview

The implementation tasks to enable SSL for IBM Personal Communications

V5.0 are as follows:

1. Be sure that you have all of the required license programs installed.

Refer to 2.1.1, “Installation prerequisites” on page 12, for the list of

required license programs.

2. Prepare a CA certificate and server certificate.

Refer to Chapter 2, “Digital Certificate Manager” on page 11, for

instructions on how to create certificates on the iSeries or AS/400 system.

Refer to Appendix D, “Creating a local Certificate Authority” on page 429,

for instructions on how to set up a local Certificate Authority.

3. Set up the OS/400 TCP/IP Telnet server to use SSL.

4. Set up IBM Personal Communications for SSL connections with client

authentication.



5.2.1 Objective

The objective of this section is to show you how to configure the OS/400

TCP/IP Telnet server to use SSL with client authentication. This scenario

uses the IBM Personal Communications V.5.0 product as the Telnet client

software. A server certificate issued by a private CA is used for establishing

SSL connection.



Chapter 5. Securing OS/400 application traffic with SSL/TLS



285



IBM Personal Communication to OS/400 V5R1



SSL connection

port 992



IBM Personal Communication 5250 client



OS/400 TCP/IP Telnet server



Figure 208. OS/400 TCP/IP Telnet server enabled for SSL



5.2.2 Configuring the iSeries server

You must enable SSL by setting the Telnet server attributes and associating

a server certificate with the OS/400 TCP/IP Telnet server application ID. In

the second step you need to update the application definition to enable client

authentication. Perform the steps in this section to configure the OS/400

TCP/IP Telnet server for SSL with client authentication.

5.2.2.1 Enabling SSL for the Telnet server

Enabling SSL for the Telnet server as described in the following steps is

necessary to open port 992 for SSL connections. However, without a server

certificate being assigned to the Telnet server, a secure connection cannot be

established. With V5R1 you can control whether the Telnet server supports

only unsecure connections, only secure connections, or both. Perform the

following steps to activate SSL support for the Telnet server:

1. Start the Operations Navigator.

2. Under the system name expand to Network->Servers and click TCP/IP to

display the list of TCP/IP server applications.

3. Right-click the TELNET server icon to display the context menu as shown

in Figure 209.



286



iSeries Wired Network Security



Figure 209. Operations Navigator expanded to Network->Servers->TCP/IP



4. Select Properties.

5. In the Properties window, click the General tab.



Figure 210. Telnet server properties: General tab



Chapter 5. Securing OS/400 application traffic with SSL/TLS



287



The new attributes allow you to control whether you allow unsecure,

secure, or both types of connections to the Telnet server. You can set the

attribute to the following values:

Secure only:



When Secure only is selected, the server listens on

port 992 only. No unsecure connections are accepted

by the Telnet server.



Non-secure only: SSL connections are not allowed. Only unsecure

connections are permitted through port 23.

Both secure and non-secure: Both SSL and non-SSL connections are

allowed. Both the ports 23 and 992 are in Listen state.

6. Select Both secure and non-secure to enable the Telnet server for

secure connections and at the same time allow non-secure connections. If

your security policies require secure connections and your infrastructure is

set up that all clients are also SSL-enabled you may want to operate the

Telnet server for SSL connections only. Another alternative is to use

OS/400 IP packet filtering to allow unsecure connections only from certain

IP addresses or subnets.

7. Click OK to save the configuration changes.

5.2.2.2 Assigning a server certificate to the Telnet server

The following steps guide you through assigning an existing server certificate

to the Telnet server. Refer to Chapter 2, “Digital Certificate Manager” on

page 11, for more information about assigning certificates to applications and

how to create certificates.

1. Start the Digital Certificate Manager through the Operations Navigator or

the AS/400 Tasks page. You need a user profile with *ALLOBJ and

*SECADM special authorities to perform the configuration.

2. Click Select a Certificate Store, then select the *SYSTEM certificate

store and click Continue.

3. Enter the certificate store password and click Continue.

4. On the DCM navigation pane, click Manage Applications.

5. From the available options under the Manage Applications group, click

Update certificate assignment.

6. As the application type, select Server and click Continue. The list of

applications registered in DCM is displayed as shown in Figure 211.



288



iSeries Wired Network Security



Figure 211. Digital Certificate Manager: Update Certificate Assignment window



7. Select the OS/400 TCP/IP Telnet Server and click Update Certificate

Assignment. The list of available certificates is displayed.



Figure 212. Digital Certificate Manager: Select a certificate



Chapter 5. Securing OS/400 application traffic with SSL/TLS



289



8. Select the certificate from the list that you want the Telnet server to use to

establish SSL connections between the Telnet server and client.

9. Click Assign New Certificate.

DCM displays a confirmation message as shown in Figure 213.



Figure 213. Digital Certificate Manager: Confirmation message



10.Click Cancel to return to the list of server applications.

5.2.2.3 Updating the application definition for client authentication

It is important to understand that when client authentication is set to Required

in the Telnet server application definition, each client that wants to connect

via a secure connection must present a certificate that is associated with an

OS/400 user profile.

The Telnet server client authentication support was already made available to

V4R4 by applying additional PTFs. A service program (QTVSSL) had to be

called to enable or disable required client authentication. In V5R1 you can

enable this support conveniently through the DCM configuration interface.

Perform the following steps to enable client authentication for the Telnet

server:

1. Start DCM.

2. From the DCM navigation pane, click Manage Applications.

3. From the Manage Applications group, click Update application

definition.

4. As the application type, select Server and click Continue. The list of

applications registered in DCM is displayed as shown in Figure 214.



290



iSeries Wired Network Security



Figure 214. Digital Certificate Manager: Update Application Definition window



5. Select the OS/400 TCP/IP Telnet Server and click Update Application

Definition.



Figure 215. Digital Certificate Manager: Selecting client authentication



Mostly, when referring to enabling the Telnet server for client

authentication, it means to configure the server to require client

authentication. The Telnet server application itself is always enabled for



Chapter 5. Securing OS/400 application traffic with SSL/TLS



291



client authentication; it just does not require it. As mentioned before, when

you configure the server so that clients must authenticate themselves by

presenting a certificate, clients without a valid certificate cannot establish

a secure connection. Be careful when configuring the Telnet server for

required client authentication.

6. Set Client authentication required to Yes and click Apply.

7. A DCM confirmation message is displayed. Click Cancel to return to the

list of server applications.

5.2.2.4 Update the CA trust list

In this last task of the server setup, you need to specify which client

certificates the Telnet server accepts for client authentication. That is, the

client certificates must be issued by a certificate authority that the Telnet

server trusts.

1. From the Manage Applications group, click Define CA trust list.

2. As the application type, select Server and click Continue. The list of

applications registered in DCM is displayed.

3. Select the OS/400 TCP/IP Telnet Server and click Define CA Trust List.



Figure 216. Digital Certificate Manager: Define CA Trust List



292



iSeries Wired Network Security



In the Define CA Trust List window, define the client or user certificates

that this server application accepts for client authentication. In other

words, only client or user certificates that are issued by a trusted CA are

accepted by the server application. The list of displayed CAs contains only

those CAs that are Enabled in the storewide CA list as defined in the Work

with CA certificates option from the Fast Path menu. This means, if you

installed a CA certificate, and it is not shown on the Define CA Trust List

window, you must ensure that the CA is enabled.

4. Select all CAs that issued user or client certificates you want the Telnet

server to accept. Note that these certificates still need to be associated

with an OS/400 user profile.

5. Click OK. The list of CAs is displayed again with a confirmation message

stating that the CAs have been trusted.

6. Click Done to return to the list of server applications.

7. Restart the Telnet server.

To activate these changes to the Telnet server, you must restart it using

the following commands:

- To stop: ENDTCPSVR SERVER(*TELNET)

- To start: STRTCPSVR SERVER(*TELNET)



Note



Take extra care when ending the Telnet server on the AS/400 system. All

active Telnet sessions will also be ended.



5.2.3 Configuring the PC

First, you must obtain a user or client certificate for the IBM Personal

Communications client. Every time the client establishes a connection the

certificate must be presented to the OS/400 TCP/IP Telnet server.

Next, you must import the private CA certificate into the key database file.

Note that if you use server and user certificates issued by a well-known CA,

you do not need to exchange CA certificates. They are usually preloaded on

all standard software applications.

The IBM Personal Communications (PComm) product has its own key

database file. After the CA certificate is imported, you have to import the



Chapter 5. Securing OS/400 application traffic with SSL/TLS



293



client or user certificate and then configure the particular emulation session to

use SSL.

5.2.3.1 Obtaining a user certificate and CA certificate

In this scenario we use a local OS/400 CA to create a user certificate. The

certificate will then automatically be associated with the user profile that

signed on to DCM. You could also obtain a certificate from a well-known CA

and manually associate the certificate using DCM to a particular OS/400 user

profile. The following steps show you how to create a user certificate:

1. Start DCM.

2. When prompted sign on with a user profile you want to create the user

certificate for. In this scenario we used a user profile without any special

authorities.

3. From the DCM navigation pane, click Create certificate.



Figure 217. Digital Certificate Manager: Create User Certificate



4. Enter the data for the certificate’s distinguished name. Note that the user

name is already filled in and cannot be altered. This assures that the new

certificate will automatically be associated with this user profile.



294



iSeries Wired Network Security



Xem Thêm
Tải bản đầy đủ (.pdf) (506 trang)

×