John Mattson writes:
>Tell me more about "self-sign"... We have users outsife of our
>Domain, and we do not want to manage PC's and Certs for users
>around the world.

Ah, now I see the source of your confusion. TLS and SSL do not require
client certificates. TLS/SSL supports them if you want some more security
capabilities, but they are certainly not required.

If all you want to do is encrypt the connection(s), then all you need is
one certificate installed and configured on the server, i.e. on your
mainframe. You can generate such a certificate yourself, right in z/OS, and
that would be what's called a self-signed certificate. That works fine for
testing. At a very high level what you'd do is use RACDCERT (or GSKKYMAN)
to generate the server certificate, add it to your keyring, and make sure
the TN3270E server is configured to use it.

You should not run this way for very long. The reason is that most TN3270E
clients are going to see warning messages when they connect to an encrypted
server using a self-signed certificate. Those warning messages indicate to
the user that the server may or may not be authentic. That is, there is no
way for the client to be sure (or at least have some degree of confidence)
that the server identity is validated. The connection is encrypted, yes,
but the server could be "spoofed." Said another way, the client could be
talking secretly, privately, with a criminal enterprise. :-) That's why
certificate authorities exist, to verify that particular servers have
particular identities -- that mainframe.epson.com really is
mainframe.epson.com, for example.

So I do recommend one of two things. Either buy a single server certificate
from a well-known certificate authority, or configure z/OS PKI Services so
that it is a "child" of a well-known certificate authority root (which you
also have to buy). In your case, since you're just getting started, I would
advise doing the former -- the one-off server certificate purchase. (The
latter path is available if you ever want to generate lots and lots of
certificates. Basically you would buy subsidiary rights from the well-known
certificate authority to generate certificates yourself for, say,
*.mainframe.epson.com and its client users.)

You seem to be worried about cost. Have you actually looked at the price of
server certificates? :-) They start under US $20 per year. (Granted, the
cheapest ones are from somewhat less known well-known CAs, but they're
still far, far better than self-signed.) I'll make a generous and exclusive
offer here (one-time only): assuming there are no laws that would be
violated, I'll send you $20 so you can buy a certificate if you can't find
the money in the sofa cushions. :-) Contact me offline if you need that.

When you are using TLS or SSL encryption, everything flowing over the
TN3270E connection is encrypted, including what the user types in to sign
on. It's very similar to HTTPS, actually. (Same encryption scheme,
different protocol riding on it.)

Hope that helps!

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: [email protected]
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to