Inline.

Eric Rossman
---------------------------------
ICSF Security Architect
z/OS Security
---------------------------------

Radoslaw Skorupka wrote:

> W dniu 03.07.2025 o 23:03, Greg Boyd pisze:
> > One of the 'more' things that the TKE does is to enforce dual
> > controls. That is, it takes two people (and maybe more) to make
> > certain changes to the hardware.
> >
> > Especially the PIN (credit card) related controls, you want that
> > dual control. The ACP to enable 24-byte DES-MKs also requires at
> > least two people to be involved. And while that might be something
> > that you wish was easier to turn on (create a RACF profile to enable
> > it), you almost certainly would NOT want to make it that easy to
> > turn off.
>
> Well, I fully understand dual control. However I cannot find any
> rationale for dual control over such things like 24-byte MK or some
> use of CSNBDKG2 service. Dual control just for dual control is
> ridiculous and provide false impression of security.

Just because you can't find the rationale does not mean there is none.
24-byte MK was done to prevent unintended consequences and has stuck.
Using even 3-key TDES is no longer recommended anyway, so I'm not sure
it matters that much anymore. As for CSNBDKG2, think of things like
DALL. I could derive a key that can derive any other kind of key and
really cause trouble. I'm not a fan of security theater so I wouldn't be
defending the design if I didn't understand what it does and why it is
worth it.

> What secret is protected by limitations of CSNBDKG2? It is key
> generate.

Wrong. It's not a key generate (despite the naming). It's really a key
derivation.

> Note, there are no such restrictions when generating clear
> keys,

Sure, but you are comparing apples to oranges. The expected level of
security for PIN processing keys vs key derivation keys vs bulk data
keys are all different.

> there are RACF profiles for use secure key as PROTECTED - which
> can be really considered as lowering the level of security.

That is only true for AES 04 (fixed-length tokens) because they had no
mechanism to control usage. This is no longer true for AES 05 (var-len).

> Dual control plus TKE is needed to change DES-MK to 24-byte (from
> 16-byte), but only one person (and no TKE) is needed to zeroize the
> key! First change is just configuration, the second is secret data
> loss.

Apples and oranges. Plus, I already explained the history behind that
particular feature. Using TKE to load master keys prevents data leakage
which is clearly more dangerous that creating more work (by zeroizing).
In a well-controlled area, clearing MK regs should cause no data loss,
just a waste of time to reload keys.

> Change MK? Just few RACF profiles. No TKE, no dual control

Change MK is not as dangerous as the actual loading of key material.
The only way a change of MK could happen would be if the key material
was able to be loaded, which should be closely controlled in a shop that
cares about security. Plus, you could easily use a TKE and have
everything you want for security.

> (although multi-user controls were implemented in z/OS 3.1 - RACF
> controlled, no TKE).

And, if you use TKE, you have multi-user control anyway.

> Last, but not least: user bought a mainframe with CryptoExpress cards.
> However he cannot use 24-byte DES-MK, because he did not buy TKE. And
> (again): the user can borrow TKE and press the button for 24-byte
> DES-MK, so it is not matter of extra-license, it is matter of missing
> knob in the car.

You have made your point on this. It has been suggested that you open an
IDEA. Feel free to do so. I will tell you now that I will only support
moving an IDEA forward if it is worth it from a security standpoint. I
am the ICSF architect and I work closely with the CCA and EP11 (and
other crypto teams) architects and we extremely interested in ensuring
we don't degrade security purely for the sake of "it's easier."


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to