>Interesting article on the SearchDataCenter site today...
>
>http://tinyurl.com/juuee
>
>Could SNA be cracked?  (Note the proper word use here.  Hackers do not do
>bad.  Crackers do bad.)
>
>Later,
>Ray
>
I consider SNA to be very insecure unless one takes steps to protect 
things. Using Telnet, SSL is a must for all 3270 sessions. This would 
help. There are other steps which people generally do not do. There is a 
free VTAM SME (Sys Mgmt Exit) from North-Ridge software which shows you 
all the traffic coming in and out of your network which you will not have 
any clue of where it is originating. The idea that one has an IBM 3745 
with a NULL network isolates one away from other networks is not true.The 
output of this, implement on the fly exit, was an eye-opener. At that time 
being connected to AT&T's network to get to IBM, and also Social Security, 
Blue Crosses, etc, opened us up to exposures. I looked around for a 
solution to this and finally installed a SNA-Firewall which gets control 
for all traffic coming into the network and has the ability to capture the 
BIND request. Anything short of seeing everything in the BIND is not good 
enough.  By looking at the BIND request, one can also see bad performance 
settings for those who are authorized to get into the network. It is 
amazing how many of the old defaults are used, work, and are causing 
performance issues. 

Think about it, z/OS or even the old “free” MVS has VTAM and can be run on 
a Laptop. I know of 10+ different ways to get into a SNA network and most 
are because of not doing things in SNA to secure things. I know of LU6.2 
sessions coming from UNIX, Windows, etc. which can connect to you to 
exploit weaknesses. Microsoft SNA Server is available and able to be used 
by anyone who might want to try to get into a SNA network. Then there is 
the “man-in-the-middle” scenario for another.  There is one way, just 
discovered, which despite all vanilla things which come in VTAM will not 
stop them; I just installed an Integrity patch onto the SNA Firewall to 
prevent it (IBM has been notified of the situation). The patch from the 
vendor says that through VTAM one can compromise VTAM traffic and also 
TCP/IP traffic in your mainframe. As with RACF integrity patches, the 
exposure is not explained.  

It appears the CISCO assistance is going help in their small area but does 
not solve the problem overall. What is really scary is now companies are 
using EE (Enterprise Extender), which was intended to be used inside of 
corporate SNA “Intranet”, to connect to a form of an SNA Internet 
connection. This from a VTAM perspective makes one company’s SNA network 
join another company’s SNA network and opens them both up for requests to 
flow through both trying to find things. 

Few people admit or recognize the exposures which exist using a SNA 
network. Most of the SNA expertise is long gone and the networks are just 
kept up with little understanding what could be done to secure things.  

 Jim  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to