On Wed, 1 Apr 2009 09:37:26 -0500, Kirk Wolf <k...@dovetail.com> wrote:

>I'm not sure exactly what this statement means wrt "passing clear-text
>passwords".  Can you supply more details?

Excellent question, Kirk.

>
>With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the network.
>(Note: FTPS needs to be configured properly to encrypt the control
>connection)
>
>To use a password from a batch client (FTPS or SSH), it is possible to put
>the password in a dataset or file that is protected by your z/OS security
>package so that only the client job can read it.  The FTPS or SSH client job
>reads this password and uses it on the connection command.
>
>FTPS also supports X5.09 certificates instead of passwords; these can be
>stored in RACF (ACF2, etc) so that only authorized users can use them for
>signing a login request.

FTPS (to the z/OS FTP server or the i5os FTP server, at least) also allows
bypassing the prompt for the client to enter a user ID and password, when
the client has supplied a digital certificate for authentication.  That woud
eliminate the need for having the password in a secured data set, as you
wouldn't need it at all. 

However, I'm not aware of any non-IBM FTP servers that have this capabiity.

>
>SSH (both Ported Tools and Tectia versions) supports a public/private DSA or
>RSA keypairs as an alternative to using a password.  The private key is
>stored in a file that is protected so that only the client job userid can
>access it (using standard Unix security bits or ACLs and your security
>package).  There is not an option to store the private key in RACF (ACF2,
>etc).

And storing a private key or a password in a protected data set are about
the same, from a security risk perspective.  So if someone will accept
storing a private key they should accept storing a password.  The only
practical difference may be that they may not require private keys to change
as often as they require passwords to change, making use of the SSH
private/public key technology a bit simpler.

Of course, one might argue that that makes using SSH private/public key
implementation weaker, in some ways, than using passwords.  It's certainly a
major factor in why we don't allow SSH authentication via private/public key
in our z/OS Common Criteria security evaluations.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to