On Wednesday, 03/11/2009 at 02:17 EDT, Tyler Koyl <[email protected]> 
wrote:
> My next question is whether I should be going with Static SSL or Dynamic 
SSL/TLS
> connections?

That depends on your client capability.  Some older telnet clients can't 
negotiate a secure connection.



> PORT
> 23   TCP INTCLIEN SECURE ZVMCER01 ; TELNET SERVER

> INTERNALCLIENTPARMS
> SECURECONNECTION REQUIRED
> ENDINTERNALCLIENTPARMS

> So at this point I am assuming that my telnet sessions are secure (or 
more
> secure). However, I do get the following disturbing message in the TCPIP 
log at
> initialization:
> 
> DTCSTM305I Telnet server: Secure Connections are REQUIRED
> DTCSTM309I Telnet server: TLS Label is <none>
> DTCSTM335E Telnet server: Unable to handle secure connections, no TLS 
label
> specified
> .
> 
> I believe this means that the telnet server itself will not handle the 
secure
> connections (Dynamic SSL\TLS) but rather TCPIP will forward the request 
for the
> secure port to the SSLSERV (Static SSL).

Please call it in.  The following are wrong:
- The text should say "Unable to negotiate secure connections with 
clients, no TLS label specified."
- The explanation in Msgs & Codes should be updated to say that static 
connections are not affected.

The REQUIRED parameter means that a session must be negotiated to be 
secure OR it be statically protected.  If a connection has been statically 
protected, the telnet server knows and will not negotate a secure 
connection.

So as it is now, DTC335E is overstating the case IF there is a label 
present on the PORT statement.  Of course, you won't really know if a 
static connection has a hope of working until you try it.  (BTW, for those 
who care, "static SSL" is the same function that z/OS calls "AT-TLS" - 
Application Transparent TLS.)

The general rule is that negotiating and non-negotating clients cannot go 
to the same port as, typically, the client will only connect in a single 
way rather than try both.  I don't know of any client that will try to 
establish a TLS session first and then, if that fails, try to negotiate a 
TLS session on the same port.

So to handle both static and negotiating telnet clients:
- Add the same TLS label to the InternalClientParms as you have on the 
PORT statement
- Add a second PORT entry for another INTCLIEN, e.g. 10023
- Add "port 23 port 10023" to the InternalClientParms
- Decide whether most of telnet client negotiate or if they require a 
static connection.  This decides whether port 23 will require static 
connections.
- If majority are static, leave port 23 as you have it.
- If majority negotiate, move the SECURE option from port 23 to port 
10023.
- Assuming the telnet client software isn't smart enough to try both ways, 
the set of clients that lost the race for port 23 must change their 
configuration to go to port 10023.

> Wondering if I am going box myself in here when I go to secure FTP 
connections
> and PERFSVM web access.

FTP will most likely be negotiated, though I have seen static clients.  A 
word about static FTP clients:
- Only inbound connections are secured, so 'passive' ftp is required
- A special form of the PORT statement is required.  See the book.
- You cannot use CCC to revert the command connection to clear-text. 
Firewalls cannot see the PASV or PORT commands and will not open a hole. 
So...
- You must use the PassivePortRange FTP server configuration statement and 
pre-define the port numbers that the FTP server will use to accept data 
connections, and...
- You must force those same port numbers open in the firewall.  This can 
be a death blow to the use of non-negotiating FTP clients or those that 
negotiate but do not support CCC.

Which brings me to a point about the support for  CCC (Clear Command 
Channel) that was added in z/VM 5.4.  If you have SECURECONTROL REQUIRED 
in the ftp server configuration, the ftp cannot use CCC.   Likewise, if 
you have SECUREDATA REQUIRED, the client cannot use the (new) CLEAR 
subcommand to in order to transfer data without encryption.

[NB.  The TCP/IP admin book has some unfortunate misspellings under 
SECURECONTROL.  Where it says 'NOW allowed' it means 'NOT allowed'.]

For PERFSVM, see the Performance Toolkit Guide, pp. 49-50.  Static SSL is 
the only method available, but you must do more than just alter the PORT 
statement.

Alan Altmark
z/VM Development
IBM Endicott

Reply via email to