Seymour J. Metz wrote:
>What's wrongwith running a 3270 client in an encrypted VPN?

Grant Taylor replied:
>IMHO, nothing.
>I think the problem comes from complications around VPNs, not the least
>of which include:
>1)  Complex configurations.  --  Does the mainframe support being a VPN
>endpoint itself?  IPsec?  Something else?

z/OS does: IPsec (IKEv2).

The major issue is that one VPN tunnel can be shared. When you operate 
this way, there's no security segregation per connection. The TN3270E 
traffic rides alongside NFS, HTTP, MQ, JDBC, ODBC, Enterprise Extender, 
and any other protocols you're using. Moreover, TN3270E Session A rides 
alongside Session B, Session C, etc. Usually you don't want multiple 
connections sharing the same private encryption keys, because the 
producers and consumers of data flowing over connection #1 should be kept 
cryptographically separated from the producers and consumers of data 
flowing over connection #2. Your connection to Production LPAR A has no 
business being in the same cryptographic "zone" as your connection to Test 
LPAR B, for example. (And maybe YOU shouldn't have those two connections 
either, but at least you can avoid cryptographically unifying these 
connections.)

You could hypothetically solve this shortcoming by carefully configuring 
multiple active VPN connections with separate credentials and routing 
rules, but that can be quite difficult in practice. Thus the usual/typical 
best practice is to encrypt each connection separately (TLS-encrypted 
TN3270E, for example) insofar as possible *and* use a VPN at least if 
you're traversing a public network (and often also even if you're not). 
There's nothing wrong with double, triple, or even quadruple encryption! 
In this case, if someone or something manages to compromise your VPN 
connection, that someone or something still won't decipher each 
connection's separately encrypted traffic and would have to compromise 
each one separately since they use separate private keys.

If you are restricted to using one and only one TN3270E session, with no 
other sessions of any type, and if the IPsec endpoints are the same 
endpoints that you would get with TLS-encrypted TN3270E, then IPsec/IKEv2 
would provide a similar level of security compared to TLS-encrypted 
TN3270E. However, even then the end user wouldn't get visible, on screen 
assurance that the network path is reasonably secured because the magic 
padlock (or similar symbol) wouldn't appear on his/her emulator's screen. 
That's subpar because you're knocking the user out of the security 
equation. End user collaboration is really important to maintain a good or 
better security posture.

As an aside, emulators should complain more loudly and forcefully when 
they're being asked to establish unencrypted sessions. I see some movement 
in that direction already, and it's a welcome development.

Anyway, in summary, if you haven't already, get AT-TLS-encrypted TN3270E 
turned on, and shut off the unencrypted stuff. You've been able to avoid 
this class of security risks for literally a quarter century, and it's 
way, way past time to avoid them if you haven't already.

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to