On Thu, 26 Mar 2009 16:58:14 -0400, P S <[email protected]> wrote:

>Sure, I've been being unnecessarily cagey -- trying to keep the
>scenario simple, and overdoing it! Sorry 'bout that.

As you've now learned, trying to hide details often results in getting less
than useful answers.

>
>I think it really is an access control issue: we have symmetric
>encryption keys that are managed by a process, but in the
>non-mainframe world, you ask the key server whether you're allowed to
>use one or not (keys have names). So the idea is that if you put the
>key *names* under ESM control, then our process asks RACF/ACF2/TSS,
>"Mother may I use this key?" rather than making the network hop.
>
>I've been told repeatedly, "RACF does not manage symmetric keys". But
>if it can manage an arbitrarily named object -- not the object
>*itself*, but access using the name -- then at least in theory, key
>names could be stored as resources in RACF, and thus access controlled
>by RACF.
>
>Does that make more sense?

Yes, and as Hayim noted that's exactly how standard crypto on z/OS (via
ICSF) works.  Keys have associated labels, and ICSF controls access to those
labels using RACF (or other ESM, presumably).

An application such as ICSF uses RACROUTE REQUEST=AUTH or FASTAUTH to do the
access checking.  Administrators define profiles in RACF to protect the
resource names (e.g., key labels) presented by the application on its
RACROUTE requests.  Administrators or system programmers define the
necessary resource class to RACF, if the application uses a resource class
not provided by RACF among the standard classes.

Of course, you would also need to worry about where you store the keys
themselves.  If your application stores them as UNIX files, with one key per
file, then in theory you could also let the system perform access control on
those files, if you run the application thread under the client user's
security identity.  Generally that's a poor way to store encryption keys, in
my opinion, but that's a mechanism that could work, depending on exactly how
your application runs (which we don't know yet).

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to