We have a situation where we have multiple queue managers that support WAS and Tuxedo applications doing request/reply with a vendor's queue manager. Up until now we have only a handful of queue managers connecting to the vendor, but the setup is difficult. We have to get NAT'd IP addresses established on the firewall for each internal server, then have to wait several weeks for the vendor to get channels and there firewall setup and hope nobody changes an IP address.
What we are considering doing is setting up an "edge-of-network" queue manager that is the only one connected to the vendor (actually probably 2 separate servers) this way our internal queue managers could connect to a clustered queue that is a remote definition to the vendor's request queue (load balance to intermediate server). This way we only have to establish connectivity with the vendor w/ 2 servers. It seems like a good idea, but has anyone tried this before and have any suggestions? I can think of at least 1 issue regarding the reply queue name. The reply message will have to be routed back to the correct internal server. We could code the intermediate servers queue manager name and reply queue in the message so the vendor automatically routes it back to a "correct" reply-to-queue. Then the intermediate reply-to-queue would be a remote definition of the real internal queue managers reply-to-queue. This would be ok, except that we would have to manage a set of intermediate reply-to-queue/remote queues. Can anyone think of a better way to do it so everything is auto-defined? Thanks in advance for any input. Brian M. McCarty USAA, Senior Systems Programmer 210.913.1678 MQ/WMQI Specialist/Solutions Expert e-business Solution Advisor/Designer/Technologist -----Original Message----- From: Wyatt, T. Rob [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 10, 2003 2:27 AM To: [EMAIL PROTECTED] Subject: Re: MQSeries in DMZ I'm in San Francisco for the Advanced Clustering class this week so maybe I'll have a different view by Friday. At the moment, however, I'd have to say that clustering adds even more security considerations into the mix. It does channel auto-definition by default and the cluster channels need all the same exits that we've already discussed. If you put an exit on a cluster receiver of your AppServer so it can talk to the DMZ, then every other server that uses the same cluster receiver needs the same exit! Furthermore, it stores a lot of data about your trusted network on its local repository so this becomes an obvious target for intruders. I'm a little leary about using a clustered DMZ node but, as I said, I may change my mind by Friday. I'll have to ask the instructor for comments. -- T.Rob -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Sunday, June 08, 2003 7:53 AM To: [EMAIL PROTECTED] Subject: Re: MQSeries in DMZ T.Bob, You have raised a good point in using the MQ server in the DMZ as a pass through and having the data processing on an internal server, perhaps a cluster might achieve this, the source queues and processing of the clear text data could occur on the internal server and the encrypted data resides in the DMZ server, then using SSL to harden the channel and using a security exit for authentication as well as firewall routing rules would give you a reasonably secure environment. I am only suggesting the cluster to give a bit of scope for expansion and perhaps easier management. When I try it here at work sometime in the next few months, I'll let everyone know how practical it is. Sid -----Original Message----- From: Wyatt, T. Rob [mailto:[EMAIL PROTECTED] Sent: Saturday, 7 June 2003 12:01 AM To: [EMAIL PROTECTED] Subject: Re: MQSeries in DMZ David, To expand a little further, the ideal situation is that encryption/signing of messages occurs at the endpoints whereas connections need to be authenticated point-to-point. So you are right that some kind of app-to-app encryption is best here. SSL only authenticates or encrypts from point-to-point and only on the wire. The messages are in plaintext on the queue making them vulnerable as they hop through the DMZ. However, firewall IP filtering does not qualify as authentication. SSL between the DMZ and the client site hardens that communication path so I still believe SSL is appropriate here. Of course, I work for a bank and take a pretty conservative approach to external connections. As far as storing keys in the DMZ, my objection is that no processing or manipulation of the messages should occur in the DMZ. They should just pass through. Keys for point-to-point authentication (SSL for example) are necessary, of course. But as far as manipulating the messages, the whole point of the DMZ is that you don't trust it, right? If you did, you wouldn't need a DMZ, you'd just put your app server right next to the external firewall and forget about it. So if we don't trust the DMZ, the last thing we want to do is store the keys to the castle in it. But as I said, my employer requires me to take a rather conservative view of these things. Your mileage may vary. -- T.Rob -----Original Message----- From: David C. Partridge [mailto:[EMAIL PROTECTED] Sent: Friday, June 06, 2003 5:39 AM To: [EMAIL PROTECTED] Subject: Re: MQSeries in DMZ Nice summary. SSL is (probably) not appropriate here for encryption purposes, and an application to application encryption product such as Primeur DSMQ E2E (preferred by me anyway, but then I'm biased, as I designed it), Candle MQSecure, or Tivoli AMBI is more appropriate. Alternatives to SSL could also be considered such as channel exit based solutions (strange we do that too!). As far as the issue of storing keys on the DMZ machine is concerned, I wouldn't be worried if the keys were stored in an HSM. Cheers Dave -----Original Message----- From: MQSeries List [mailto:[EMAIL PROTECTED] Behalf Of Wyatt, T. Rob Sent: 05 June 2003 19:00 To: [EMAIL PROTECTED] Subject: Re: MQSeries in DMZ Tim, Make sure you use MQ 5.3 in the DMZ. One of the new features is a channel attribute that binds the channel to a particular local IP address. Your DMZ will have two addresses we are concerned with - the IP address your trusted network sees, and the IP address the world sees. You will also have two categories of channel: customer-facing channels and internal-facing channels. By specifying the LOCLADDR, you can insure that your internal-facing channels are not hijacked by external users. For example, assume your DMZ server has a RCVR or RQSTR channel called APPSVR.DMZ with no exit. One of your customers could create a SDR or SVR channel called APPSVR.DMZ and try to start it. Without a LOCLADDR specified, the channel would bind to the external-facing IP and the firewall would allow the connection. On the other hand, if you set the LOCLADDR attribute to your internal-facing IP address, the external firewall will disallow the connection. There are a LOT of other considerations. For example, if the data is sensitive and encrypted, you don't want to store the keys on the DMZ. It would be better to have the messages signed/encrypted at either end and have them pass the DMZ unaltered. Also, IP filtering as provided at the firewall is strong but not 100% reliable. It is possible to spoof an IP address and it is possible that an intrusion attempt could come from a trusted business partner. If your listeners are running as mqm, they can potentially be hijacked. Better to run your listeners as low-privileged IDs. Use different listeners and ports for internal-facing and external-facing connections. In fact, use different listeners for each customer if you want to be really safe. Finally, consider the implications of multiple clients using the same QMgr. If one client can put messages onto another client's remote queue, your company may be partially liable for any damages that are caused. You can enforce isolation of each client's traffic if each client has its own listener, running under its own ID, listening on its own port; and each client has its own channel pair, its own UserID in the MCAUSER, and its own remote queues authorized to that UserID. This is just a quick review. If you really want to harden your DMZ (and I hope you do by now!) There are many additional options available in MQ configuration, exits, architecture, etc. It all depends on how valuable and sensitive the messages are and how far you want to go to protect them. -- T.Rob -----Original Message----- From: Madsen, Timothy [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 04, 2003 11:06 AM To: [EMAIL PROTECTED] Subject: MQSeries in DMZ Hello, We have external partners who need to connect to our MQSeries. So, we could put an MQSeries server in our DMZ and let those external people connect to that MQ and then have the DMZ MQ connect to our internal MQ. We can configure our firewall (Cisco Pix) to only let MQ appropriate ports/protocols pass from the internet to the DMZ MQ server. However, we would still be allowing **anybody** on the internet to send messages to our MQSeries in our DMZ. We are working with a small list of partners - they are not anonymous. So - from this two questions: 1) Would this be considered a fairly secure configuration - from the standpoint of a hacker trying to get into our MQ box and crash it or access OS services? 2) What is a standard method whereby we could allow our external partners to send MQ messages - but not allow other people on the internet to send MQ messages to our DMZ MQ server? Thanks. Tim. Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com Archive: http://vm.akh-wien.ac.at/MQSeries.archive