Walt,

I guess its cool now for IBM security audits to prefer passwords to
certificates, now that z/OS 1.10 TSO supports >8 character passwords ;-)

Its a pity that RACF (and hw keystores) can't store SSH-style public/private
keys (DSA, RSA) and support sign/check functions, to be exploited by z/OS
SSH.  X.509 isn't the only game in town, and the SSH RFC group has some good
rationale against adopting it.

But z/OS Ported Tools OpenSSH has several weaknesses wrt security - where's
kerberos? where's PAM?

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

On Wed, Apr 1, 2009 at 10:48 AM, Walt Farrell <[email protected]> wrote:

> On Wed, 1 Apr 2009 09:37:26 -0500, Kirk Wolf <[email protected]> wrote:
>
> >I'm not sure exactly what this statement means wrt "passing clear-text
> >passwords".  Can you supply more details?
>
> Excellent question, Kirk.
>
> >
> >With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the network.
> >(Note: FTPS needs to be configured properly to encrypt the control
> >connection)
> >
> >To use a password from a batch client (FTPS or SSH), it is possible to put
> >the password in a dataset or file that is protected by your z/OS security
> >package so that only the client job can read it.  The FTPS or SSH client
> job
> >reads this password and uses it on the connection command.
> >
> >FTPS also supports X5.09 certificates instead of passwords; these can be
> >stored in RACF (ACF2, etc) so that only authorized users can use them for
> >signing a login request.
>
> FTPS (to the z/OS FTP server or the i5os FTP server, at least) also allows
> bypassing the prompt for the client to enter a user ID and password, when
> the client has supplied a digital certificate for authentication.  That
> woud
> eliminate the need for having the password in a secured data set, as you
> wouldn't need it at all.
>
> However, I'm not aware of any non-IBM FTP servers that have this capabiity.
>
> >
> >SSH (both Ported Tools and Tectia versions) supports a public/private DSA
> or
> >RSA keypairs as an alternative to using a password.  The private key is
> >stored in a file that is protected so that only the client job userid can
> >access it (using standard Unix security bits or ACLs and your security
> >package).  There is not an option to store the private key in RACF (ACF2,
> >etc).
>
> And storing a private key or a password in a protected data set are about
> the same, from a security risk perspective.  So if someone will accept
> storing a private key they should accept storing a password.  The only
> practical difference may be that they may not require private keys to
> change
> as often as they require passwords to change, making use of the SSH
> private/public key technology a bit simpler.
>
> Of course, one might argue that that makes using SSH private/public key
> implementation weaker, in some ways, than using passwords.  It's certainly
> a
> major factor in why we don't allow SSH authentication via private/public
> key
> in our z/OS Common Criteria security evaluations.
>
> --
>  Walt Farrell, CISSP
>  IBM STSM, z/OS Security Design
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to