MQTC v2015-SSL-TLS Using and Managing Certificates
MQTC v2015-SSL-TLS Using and Managing Certificates
MQTC v2015-SSL-TLS Using and Managing Certificates
or
Certificates
Certificate Management
History
– X.509 introduced in 1988
– Developed by the International Telecommunications Union (ITU)
T – SSL introduced in 1994
– Developed by Netscape to support their HTTPS protocol
– Versions 1.0, 2.0. 3.0 Transport Layer Security (TLS) introduced in 1999
– Developed by the Internet Engineering Task Force
E – Extended SSL Version 3.0
– Versions 1.0, 1.1, 1.2, 1.3 (Draft)
– Each of these versions (both SSL and TLS) is a different protocol
– These versions do not interoperate!
OK. Better. But you’ve got me worried. Is it really IBM on the other side?
– The sensitive data has been encrypted.
– The destination has not been authenticated.
If you’re not doing both of these things, then maybe you should be!
– One of the primary uses of SSL/TLS within WMQ is to authenticate clients!
– If you have encryption turned on, are you also using ALS to protect your messages on disk?
SSL or TLS can be used to assert the identity of each of the two servers
– Identity checking of the client must be requested - SSLCAUTH (REQUIRED)
– Each server must posses a Personal Certificate in their Keystore
– Each server must posses the signer certificates of the remote server in their Truststore
– Note that what is being authenticated is the identity of the server, not the User ID initiating the
SSL/TLS connection!
Neither SSL nor TLS deny access at the protocol level by default
– However, WMQ requires certificates to be trusted (i.e. their signer in your Truststore)
– “Filtering” of certificates performed implicitly by the Truststore
– ”Filtering” of certificates may also be performed explicitly - SSLPEER
Truststore
E – Two different, but related, meanings:
o As a file; a specialized Keystore used to only store Signer certificates
o As a function; the portion of the Keystore file that contains Signer certificates
– Separate Truststore files are ot used by all software
S – Separate Truststore files simplify certificate management
Personal Certificate
– An X.509 certificate asserting the identify of a URL, Server, or person.
E – Contains the Public key and associated with a private key through the Keystore.
– Either Self-signed or issued by a Certificate Authority.
– Multiple formats for certificates:
– ARM, DER, PEM, PKCS #7, & PKCS #12.
S – Certificate formats containing a private key are password protected.
Private Key
E – The private (secret) part of a Public/Private key pair.
– Created when a CSR is generated and stored in the Keystore from which the CSR originated.
– Associated in a Keystore with a Public Certificate when the Certificate is “Received” from the
CA.
S
Certificates
o O (Organization)
– Name certificate represents (e.g. “Capitalware”)
o OU (Organizational Unit)
– Hierarchy within organization (e.g. “OU=Education”, “OU=MQTC”)
o L (Locality)
– Geographic Location or City (e.g. “Sandusky”)
o ST (State)
– State of Locality (e.g. “Ohio”)
o C (Country)
– Country of Locality (e.g. “US”)
Certificate Management
Java (Oracle)
– Versioned by Java software releases
– Command Line
o keytool
Open Source
– Command Line
o openssl
Tool usage
o The use of multiple tools may/will be required
o Check the software version of the tool for compatibility with the target software
Tool location
o Central location (your workstation?)
o On the servers with Keystores/Trustores
Security
o Certificate files
o Keystore and stash files
Reference
TechDoc on SSL/TLS
– Contact me