Or CommerceQuest's ProtectMQ.

--- "David C. Partridge" <[EMAIL PROTECTED]>
wrote:
> Nice summary.   SSL is (probably) not appropriate
> here for encryption
> purposes, and an application to application
> encryption product such as
> Primeur DSMQ E2E (preferred by me anyway, but then
> I'm biased, as I designed
> it), Candle MQSecure, or Tivoli AMBI is more
> appropriate.
>
> Alternatives to SSL could also be considered such as
> channel exit based
> solutions (strange we do that too!).   As far as the
> issue of storing keys
> on the DMZ machine is concerned, I wouldn't be
> worried if the keys were
> stored in an HSM.
>
> Cheers
> Dave
>
> -----Original Message-----
> From: MQSeries List
> [mailto:[EMAIL PROTECTED] Behalf Of Wyatt,
> T. Rob
> Sent: 05 June 2003 19:00
> To: [EMAIL PROTECTED]
> Subject: Re: MQSeries in DMZ
>
>
> Tim,
>
> Make sure you use MQ 5.3 in the DMZ.  One of the new
> features is a channel
> attribute that binds the channel to a particular
> local IP address.  Your DMZ
> will have two addresses we are concerned with - the
> IP address your trusted
> network sees, and the IP address the world sees.
> You will also have two
> categories of channel: customer-facing channels and
> internal-facing
> channels.  By specifying the LOCLADDR, you can
> insure that your
> internal-facing channels are not hijacked by
> external users.
>
> For example, assume your DMZ server has a RCVR or
> RQSTR channel called
> APPSVR.DMZ with no exit.  One of your customers
> could create a SDR or SVR
> channel called APPSVR.DMZ and try to start it.
> Without a LOCLADDR specified,
> the channel would bind to the external-facing IP and
> the firewall would
> allow the connection.  On the other hand, if you set
> the LOCLADDR attribute
> to your internal-facing IP address, the external
> firewall will disallow the
> connection.
>
> There are a LOT of other considerations.  For
> example, if the data is
> sensitive and encrypted, you don't want to store the
> keys on the DMZ.  It
> would be better to have the messages
> signed/encrypted at either end and have
> them pass the DMZ unaltered.
>
> Also, IP filtering as provided at the firewall is
> strong but not 100%
> reliable.  It is possible to spoof an IP address and
> it is possible that an
> intrusion attempt could come from a trusted business
> partner.  If your
> listeners are running as mqm, they can potentially
> be hijacked.  Better to
> run your listeners as low-privileged IDs.  Use
> different listeners and ports
> for internal-facing and external-facing connections.
>  In fact, use different
> listeners for each customer if you want to be really
> safe.
>
> Finally, consider the implications of multiple
> clients using the same QMgr.
> If one client can put messages onto another client's
> remote queue, your
> company may be partially liable for any damages that
> are caused.  You can
> enforce isolation of each client's traffic if each
> client has its own
> listener, running under its own ID, listening on its
> own port; and each
> client has its own channel pair, its own UserID in
> the MCAUSER, and its own
> remote queues authorized to that UserID.
>
> This is just a quick review.  If you really want to
> harden your DMZ (and I
> hope you do by now!) There are many additional
> options available in MQ
> configuration, exits, architecture, etc.  It all
> depends on how valuable and
> sensitive the messages are and how far you want to
> go to protect them.
>
> -- T.Rob
>
>
> -----Original Message-----
> From: Madsen, Timothy [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, June 04, 2003 11:06 AM
> To: [EMAIL PROTECTED]
> Subject: MQSeries in DMZ
>
>
> Hello,
> We have external partners who need to connect to our
> MQSeries.  So, we could
> put an MQSeries server in our DMZ and let those
> external people connect to
> that MQ and then have the DMZ MQ connect to our
> internal MQ.  We can
> configure our firewall (Cisco Pix) to only let MQ
> appropriate
> ports/protocols pass from the internet to the DMZ MQ
> server.
>
> However, we would still be allowing **anybody** on
> the internet to send
> messages to our MQSeries in our DMZ.  We are working
> with a small list of
> partners - they are not anonymous.
>
> So - from this two questions:
>
> 1)  Would this be considered a fairly secure
> configuration - from the
> standpoint of a hacker trying to get into our MQ box
> and crash it or access
> OS services?
>
> 2)  What is a standard method whereby we could allow
> our external partners
> to send MQ messages - but not allow other people on
> the internet to send MQ
> messages to our DMZ MQ server?
>
> Thanks.
> Tim.
>
> Instructions for managing your mailing list
> subscription are provided in
> the Listserv General Users Guide available at
> http://www.lsoft.com
> Archive: http://vm.akh-wien.ac.at/MQSeries.archive
>
> Instructions for managing your mailing list
> subscription are provided in
> the Listserv General Users Guide available at
> http://www.lsoft.com
> Archive: http://vm.akh-wien.ac.at/MQSeries.archive
>
> Instructions for managing your mailing list
> subscription are provided in
> the Listserv General Users Guide available at
> http://www.lsoft.com
> Archive: http://vm.akh-wien.ac.at/MQSeries.archive


__________________________________
Do you Yahoo!?
Yahoo! Calendar - Free online calendar with sync to Outlook(TM).
http://calendar.yahoo.com

Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://vm.akh-wien.ac.at/MQSeries.archive

Reply via email to