Discussion:
IBM MQ, SSL and the POODLE Attack
Potkay, Peter M (CTO Architecture + Engineering)
2014-10-22 15:43:52 UTC
Permalink
T.Rob,
If we’re going to be changing Ciphers to avoid SSL, what about also staying away from SHA-1, even the TLS SHAs. Hasn’t SHA-1 been (theoretically?) compromised and if you are going to pic a TLS SHA Cipher, you should pick one that is not SHA-1?

Table showing which Ciphers use SSL or not, which use SHA-1 or not:
http://www-01.ibm.com/support/knowledgecenter/SSFKSJ_7.5.0/com.ibm.mq.sec.doc/q014260_.htm


I Googled “Chrome Support for SHA-1” after overhearing someone talking about it and that’s why I’m thinking we should no longer choose SHA-1 for anything new. Yes?


Peter Potkay

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of T.Rob
Sent: Wednesday, October 22, 2014 10:53 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT
Subject: Re: IBM MQ, SSL and the PODLE Attack
Since SSL v3 is no longer supported, the security community has basically “pulled the plug” on SSL v3.
About time. SSL v3 has other known vulns, but apparently this one we care about. There's an easy test for it so fair enough. Incidentally, as you are looking for alternate ciphers, keep in mind that MD5 is also broken and CBC has some known issues. If I had to pick one, I'd take CBC over MD5 in a heartbeat though.

The SSL Labs site Peter points to is great. I frequently point people at it. And while you are busy testing, take a look at http://checktls.com where they test your company's SMTP (email) server. As bad as HTTPS is, email is 100 times worse. Half the time the servers are set up to accept plaintext connections if the encrypted ones fail and the encryption is often SSL at best. But nobody sees the SMTP servers or deals with mail transfer at the back end other than admins. Instead of encryption they have a kludge of putting authentication info into DNS records but it's hardly what you'd call secure. Wouldn't it be cool if CheckTLS.com went viral and half the net started asking their companies and ISPs why email was so bad?


Kind regards,
-- T.Rob

T.Robert Wyatt, Managing partner
IoPT Consulting, LLC
+1 704-443-TROB (8762) Voice/Text
+44 (0) 8714 089 546 Voice
https://ioptconsulting.com<https://ioptconsulting.com/>
https://twitter.com/tdotrob

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of Tim Zielke
Sent: Wednesday, October 22, 2014 9:43 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

My understanding is that any cipher that uses the TLS protocol would remediate POODLE. I used the MQ v8 manual which lists what protocol (i.e. SSL v3, TLS 1.0, TLS 1.2) the cipher is using -> http://www-01.ibm.com/support/knowledgecenter/#!/SSFKSJ_8.0.0/com.ibm.mq.sec.doc/q014260_copy.htm.

As Isvtan mentioned, it would be better to also choose a TLS cipher that is also FIPS compliant. The IBM MQ security bulletin for POODLE tells you which TLS ciphers are not FIPS compliant -> http://www-01.ibm.com/support/docview.wss?uid=swg21687433&myns=swgws&mynp=OCSSFKSJ&mync=E

This is my understanding of POODLE based on the research I have done. POODLE (Padding Oracle on Downgraded Legacy Encryption) is a new security vulnerability on SSL v3. Padding Oracle is the method to do the security breach. Downgraded Legacy Encryption is SSL v3. Since SSL v3 is no longer supported, the security community has basically “pulled the plug” on SSL v3.


From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of David Awerbuch (BLOOMBERG/ 120 PARK)
Sent: Wednesday, October 22, 2014 8:22 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

Is there a definitive list of the TLS cipherspecs?

We are running 7.5 mgrs, our connection partners are running server 8.0, 7.5, 7.1, 7.0, and a few are still at 6.0.
Customer client verions are across the spectrum.

Thanks.
Dave
----- Original Message -----
From: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
At: Oct 21 2014 21:01:14
It looks like POODLE has caused the security community to put the fork in SSL. We just have TLS from here on out, for “secure” MQ ciphers.

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of ***@COMCAST.NET<mailto:***@COMCAST.NET>
Sent: Tuesday, October 21, 2014 6:34 PM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

yes, AFAIK you just need to use a TLS cipherspec

________________________________
From: "Peter M Potkay (CTO Architecture + Engineering)" <***@THEHARTFORD.COM<mailto:***@THEHARTFORD.COM>>
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Sent: Tuesday, October 21, 2014 5:19:41 PM
Subject: Re: IBM MQ, SSL and the PODLE Attack

Would it be accurate to say
If your QM is running with SSLFIPS(YES) you are not vulnerable to POODLE, but you do not necessarily need to be SSL FIPS compliant to remediate the POODLE attack.

Peter Potkay

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of Neil Casey
Sent: Tuesday, October 21, 2014 4:58 PM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

Hi,

thanks for your work, and for publishing the results.

I would just like to ask
 what was the cipher spec defined in the channel?

Successfully establishing an MQ channel requires more than just the SSL session. The negotiated cipher has to match the SSLCIPH value too.

Regards,

Neil Casey.


On 22 Oct 2014, at 4:48 am, Istvan M. <***@GMAIL.COM<mailto:***@GMAIL.COM>> wrote:

Hello List,

just tested on Linux with a small script provided by RedHat.

QMNAME(QM1V701) SSLFIPS(NO)
-bash-4.1$ ./poodle.sh
127.0.0.1:1414<http://127.0.0.1:1414/> - Vulnerable! SSLv3 connection established using SSLv3/AES128-SHA

QMNAME(QM1V701) SSLFIPS(YES)
-bash-4.1$ ./poodle.sh
127.0.0.1:1414<http://127.0.0.1:1414/> - Not vulnerable. Failed to establish SSLv3 connection.

poodle.sh: https://access.redhat.com/articles/1232123 at "attachments"

So enabling FIPS mode really solves this vulnerability.

On Mon, Oct 20, 2014 at 8:23 PM, Istvan M. <***@gmail.com<mailto:***@gmail.com>> wrote:
Hello List,

I've been waiting for this technote, really, we suspected that enabling SSLFIPS with a good cipher (TLS_RSA_WITH_AES_256_CBC_SHA for example, good for distributed, Z and i platforms) will eliminate this problem.
Now it's official. Tomorrow I'll test it. I assume Broker is also affected (seems no exceptions, everything is affected if it uses SSLv3).

On Mon, Oct 20, 2014 at 6:46 PM, Potkay, Peter M (CTO Architecture + Engineering) <***@thehartford.com<mailto:***@thehartford.com>> wrote:
This just came out from IBM on how MQ is impacted by POODLE:

http://www-01.ibm.com/support/docview.wss?uid=swg21687433&myns=swgws&mynp=OCSSFKSJ&mync=E


Still waiting for the WMB TechNote on POODLE.



Peter Potkay

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>
Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>
--
Üdvözlettel / Best regards,
Melich István / Istvan Melich
--
Best regards / Üdvözlettel,
MELICH, István

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>
Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>


________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>


________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>



<< "Once the game is over, the king and the pawn go back into the same box." - Anon >>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>
************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************


To unsubscribe, write to ***@LISTSERV.MEDUNIWIEN.AC.AT and,
in the message body (not the subject), write: SIGNOFF MQSERIES
Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://listserv.meduniwien.ac.at/archives/mqser-l.html
T.Rob
2014-10-22 17:55:18 UTC
Permalink
SHA1 is deprecated but still viable for compatibility on those platforms where it is the greatest common denominator. If you can get past SHA1, do so. I haven't looked recently to see the distribution of ciphers across all platforms but for Dave's case (Bloomberg's clients all over the map on versioning) it might not be possible. Or at least not without provisioning channels with the names "DEPRECATED" and "SECURE" in them and making clients switch to the secure ones where possible. Yeah, I know its invasive but the difference represents latent risk and making two sets of channels is the least invasive thing I can think of that raises visibility to customers. In any case, it isn't good if one back-level customer imposes that latent risk on the other 99. Classes of service are the way to go here.





Kind regards,

-- T.Rob



From: MQSeries List [mailto:MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org] On Behalf Of Potkay, Peter M (CTO Architecture + Engineering)
Sent: Wednesday, October 22, 2014 11:44 AM
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Subject: Re: IBM MQ, SSL and the POODLE Attack



T.Rob,

If we’re going to be changing Ciphers to avoid SSL, what about also staying away from SHA-1, even the TLS SHAs. Hasn’t SHA-1 been (theoretically?) compromised and if you are going to pic a TLS SHA Cipher, you should pick one that is not SHA-1?



Table showing which Ciphers use SSL or not, which use SHA-1 or not:

http://www-01.ibm.com/support/knowledgecenter/SSFKSJ_7.5.0/com.ibm.mq.sec.doc/q014260_.htm





I Googled “Chrome Support for SHA-1” after overhearing someone talking about it and that’s why I’m thinking we should no longer choose SHA-1 for anything new. Yes?





Peter Potkay



From: MQSeries List [mailto:MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org] On Behalf Of T.Rob
Sent: Wednesday, October 22, 2014 10:53 AM
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Subject: Re: IBM MQ, SSL and the PODLE Attack
Since SSL v3 is no longer supported, the security community has basically “pulled the plug” on SSL v3.
About time. SSL v3 has other known vulns, but apparently this one we care about. There's an easy test for it so fair enough. Incidentally, as you are looking for alternate ciphers, keep in mind that MD5 is also broken and CBC has some known issues. If I had to pick one, I'd take CBC over MD5 in a heartbeat though.



The SSL Labs site Peter points to is great. I frequently point people at it. And while you are busy testing, take a look at http://checktls.com where they test your company's SMTP (email) server. As bad as HTTPS is, email is 100 times worse. Half the time the servers are set up to accept plaintext connections if the encrypted ones fail and the encryption is often SSL at best. But nobody sees the SMTP servers or deals with mail transfer at the back end other than admins. Instead of encryption they have a kludge of putting authentication info into DNS records but it's hardly what you'd call secure. Wouldn't it be cool if CheckTLS.com went viral and half the net started asking their companies and ISPs why email was so bad?





Kind regards,

-- T.Rob



T.Robert Wyatt, Managing partner

IoPT Consulting, LLC

+1 704-443-TROB (8762) Voice/Text

+44 (0) 8714 089 546 Voice

https://ioptconsulting.com <https://ioptconsulting.com/>

https://twitter.com/tdotrob



From: MQSeries List [mailto:MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org] On Behalf Of Tim Zielke
Sent: Wednesday, October 22, 2014 9:43 AM
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Subject: Re: IBM MQ, SSL and the PODLE Attack



My understanding is that any cipher that uses the TLS protocol would remediate POODLE. I used the MQ v8 manual which lists what protocol (i.e. SSL v3, TLS 1.0, TLS 1.2) the cipher is using -> http://www-01.ibm.com/support/knowledgecenter/#!/SSFKSJ_8.0.0/com.ibm.mq.sec.doc/q014260_copy.htm.



As Isvtan mentioned, it would be better to also choose a TLS cipher that is also FIPS compliant. The IBM MQ security bulletin for POODLE tells you which TLS ciphers are not FIPS compliant -> http://www-01.ibm.com/support/docview.wss?uid=swg21687433 <http://www-01.ibm.com/support/docview.wss?uid=swg21687433&myns=swgws&mynp=OCSSFKSJ&mync=E> &myns=swgws&mynp=OCSSFKSJ&mync=E



This is my understanding of POODLE based on the research I have done. POODLE (Padding Oracle on Downgraded Legacy Encryption) is a new security vulnerability on SSL v3. Padding Oracle is the method to do the security breach. Downgraded Legacy Encryption is SSL v3. Since SSL v3 is no longer supported, the security community has basically “pulled the plug” on SSL v3.





From: MQSeries List [mailto:MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org] On Behalf Of David Awerbuch (BLOOMBERG/ 120 PARK)
Sent: Wednesday, October 22, 2014 8:22 AM
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Subject: Re: IBM MQ, SSL and the PODLE Attack



Is there a definitive list of the TLS cipherspecs?

We are running 7.5 mgrs, our connection partners are running server 8.0, 7.5, 7.1, 7.0, and a few are still at 6.0.
Customer client verions are across the spectrum.

Thanks.
Dave

----- Original Message -----
From: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
At: Oct 21 2014 21:01:14

It looks like POODLE has caused the security community to put the fork in SSL. We just have TLS from here on out, for “secure” MQ ciphers.



From: MQSeries List [mailto:MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org] On Behalf Of dhornby5-***@public.gmane.org
Sent: Tuesday, October 21, 2014 6:34 PM
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Subject: Re: IBM MQ, SSL and the PODLE Attack



yes, AFAIK you just need to use a TLS cipherspec




_____


From: "Peter M Potkay (CTO Architecture + Engineering)" <Peter.Potkay-***@public.gmane.org>
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Sent: Tuesday, October 21, 2014 5:19:41 PM
Subject: Re: IBM MQ, SSL and the PODLE Attack



Would it be accurate to say
If your QM is running with SSLFIPS(YES) you are not vulnerable to POODLE, but you do not necessarily need to be SSL FIPS compliant to remediate the POODLE attack.



Peter Potkay



From: MQSeries List [mailto:MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org] On Behalf Of Neil Casey
Sent: Tuesday, October 21, 2014 4:58 PM
To: MQSERIES-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org
Subject: Re: IBM MQ, SSL and the PODLE Attack



Hi,



thanks for your work, and for publishing the results.



I would just like to ask
 what was the cipher spec defined in the channel?



Successfully establishing an MQ channel requires more than just the SSL session. The negotiated cipher has to match the SSLCIPH value too.



Regards,



Neil Casey.





On 22 Oct 2014, at 4:48 am, Istvan M. <ipl873-8a+***@public.gmane.org> wrote:



Hello List,



just tested on Linux with a small script provided by RedHat.



QMNAME(QM1V701) SSLFIPS(NO)

-bash-4.1$ ./poodle.sh

127.0.0.1:1414 <http://127.0.0.1:1414/> - Vulnerable! SSLv3 connection established using SSLv3/AES128-SHA



QMNAME(QM1V701) SSLFIPS(YES)

-bash-4.1$ ./poodle.sh

127.0.0.1:1414 <http://127.0.0.1:1414/> - Not vulnerable. Failed to establish SSLv3 connection.



poodle.sh: https://access.redhat.com/articles/1232123 at "attachments"



So enabling FIPS mode really solves this vulnerability.



On Mon, Oct 20, 2014 at 8:23 PM, Istvan M. <ipl873-***@public.gmane.org> wrote:

Hello List,



I've been waiting for this technote, really, we suspected that enabling SSLFIPS with a good cipher (TLS_RSA_WITH_AES_256_CBC_SHA for example, good for distributed, Z and i platforms) will eliminate this problem.

Now it's official. Tomorrow I'll test it. I assume Broker is also affected (seems no exceptions, everything is affected if it uses SSLv3).



On Mon, Oct 20, 2014 at 6:46 PM, Potkay, Peter M (CTO Architecture + Engineering) <Peter.Potkay-***@public.gmane.org> wrote:

This just came out from IBM on how MQ is impacted by POODLE:



http://www-01.ibm.com/support/docview.wss?uid=swg21687433 <http://www-01.ibm.com/support/docview.wss?uid=swg21687433&myns=swgws&mynp=OCSSFKSJ&mync=E> &myns=swgws&mynp=OCSSFKSJ&mync=E





Still waiting for the WMB TechNote on POODLE.







Peter Potkay



************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************




_____


List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>
--
Üdvözlettel / Best regards,

Melich István / Istvan Melich





--



Best regards / Üdvözlettel,

MELICH, István




_____


List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>






_____


List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************




_____


List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>






_____


List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>




_____


List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>





<< "Once the game is over, the king and the pawn go back into the same box." - Anon >>



_____

List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>



_____

List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>



_____

List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************



_____

List Archive <http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings <http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe <mailto:LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com <http://www.lsoft.com/resources/manuals.asp>


To unsubscribe, write to LISTSERV-0lvw86wZMd9k/bWDasg6f+***@public.gmane.org and,
in the message body (not the subject), write: SIGNOFF MQSERIES
Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://listserv.meduniwien.ac.at/archives/mqser-l.html
Tim Zielke
2014-10-22 21:04:22 UTC
Permalink
Here is something that I recently ran across that I thought was worth posting. If someone with more MQ or encryption knowledge wants to refute my statements, please do. I don’t claim to be an expert!

It sounds like there are other valid security reasons to move from RC4, but one thing I have just become aware of is that it looks like RC4 is not susceptible to POODLE because it is not a CBC based cipher.

http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability
https://www.imperialviolet.org/2014/10/14/poodle.html

So it does look like there are MQ SSL v3 ciphers (i.e RC4_MD5_US) that are not susceptible to POODLE.

Please note, I am not trying to refute the recommendation of the IBM MQ security bulletin on POODLE. I just thought this extra piece of information was worth knowing for the other MQ administrators out there.

Thanks,
Tim


From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of T.Rob
Sent: Wednesday, October 22, 2014 12:55 PM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT
Subject: Re: IBM MQ, SSL and the POODLE Attack

SHA1 is deprecated but still viable for compatibility on those platforms where it is the greatest common denominator. If you can get past SHA1, do so. I haven't looked recently to see the distribution of ciphers across all platforms but for Dave's case (Bloomberg's clients all over the map on versioning) it might not be possible. Or at least not without provisioning channels with the names "DEPRECATED" and "SECURE" in them and making clients switch to the secure ones where possible. Yeah, I know its invasive but the difference represents latent risk and making two sets of channels is the least invasive thing I can think of that raises visibility to customers. In any case, it isn't good if one back-level customer imposes that latent risk on the other 99. Classes of service are the way to go here.


Kind regards,
-- T.Rob

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of Potkay, Peter M (CTO Architecture + Engineering)
Sent: Wednesday, October 22, 2014 11:44 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the POODLE Attack

T.Rob,
If we’re going to be changing Ciphers to avoid SSL, what about also staying away from SHA-1, even the TLS SHAs. Hasn’t SHA-1 been (theoretically?) compromised and if you are going to pic a TLS SHA Cipher, you should pick one that is not SHA-1?

Table showing which Ciphers use SSL or not, which use SHA-1 or not:
http://www-01.ibm.com/support/knowledgecenter/SSFKSJ_7.5.0/com.ibm.mq.sec.doc/q014260_.htm


I Googled “Chrome Support for SHA-1” after overhearing someone talking about it and that’s why I’m thinking we should no longer choose SHA-1 for anything new. Yes?


Peter Potkay

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of T.Rob
Sent: Wednesday, October 22, 2014 10:53 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack
Since SSL v3 is no longer supported, the security community has basically “pulled the plug” on SSL v3.
About time. SSL v3 has other known vulns, but apparently this one we care about. There's an easy test for it so fair enough. Incidentally, as you are looking for alternate ciphers, keep in mind that MD5 is also broken and CBC has some known issues. If I had to pick one, I'd take CBC over MD5 in a heartbeat though.

The SSL Labs site Peter points to is great. I frequently point people at it. And while you are busy testing, take a look at http://checktls.com where they test your company's SMTP (email) server. As bad as HTTPS is, email is 100 times worse. Half the time the servers are set up to accept plaintext connections if the encrypted ones fail and the encryption is often SSL at best. But nobody sees the SMTP servers or deals with mail transfer at the back end other than admins. Instead of encryption they have a kludge of putting authentication info into DNS records but it's hardly what you'd call secure. Wouldn't it be cool if CheckTLS.com went viral and half the net started asking their companies and ISPs why email was so bad?


Kind regards,
-- T.Rob

T.Robert Wyatt, Managing partner
IoPT Consulting, LLC
+1 704-443-TROB (8762) Voice/Text
+44 (0) 8714 089 546 Voice
https://ioptconsulting.com<https://ioptconsulting.com/>
https://twitter.com/tdotrob

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of Tim Zielke
Sent: Wednesday, October 22, 2014 9:43 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

My understanding is that any cipher that uses the TLS protocol would remediate POODLE. I used the MQ v8 manual which lists what protocol (i.e. SSL v3, TLS 1.0, TLS 1.2) the cipher is using -> http://www-01.ibm.com/support/knowledgecenter/#!/SSFKSJ_8.0.0/com.ibm.mq.sec.doc/q014260_copy.htm.

As Isvtan mentioned, it would be better to also choose a TLS cipher that is also FIPS compliant. The IBM MQ security bulletin for POODLE tells you which TLS ciphers are not FIPS compliant -> http://www-01.ibm.com/support/docview.wss?uid=swg21687433&myns=swgws&mynp=OCSSFKSJ&mync=E

This is my understanding of POODLE based on the research I have done. POODLE (Padding Oracle on Downgraded Legacy Encryption) is a new security vulnerability on SSL v3. Padding Oracle is the method to do the security breach. Downgraded Legacy Encryption is SSL v3. Since SSL v3 is no longer supported, the security community has basically “pulled the plug” on SSL v3.


From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of David Awerbuch (BLOOMBERG/ 120 PARK)
Sent: Wednesday, October 22, 2014 8:22 AM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

Is there a definitive list of the TLS cipherspecs?

We are running 7.5 mgrs, our connection partners are running server 8.0, 7.5, 7.1, 7.0, and a few are still at 6.0.
Customer client verions are across the spectrum.

Thanks.
Dave
----- Original Message -----
From: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
At: Oct 21 2014 21:01:14
It looks like POODLE has caused the security community to put the fork in SSL. We just have TLS from here on out, for “secure” MQ ciphers.

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of ***@COMCAST.NET<mailto:***@COMCAST.NET>
Sent: Tuesday, October 21, 2014 6:34 PM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

yes, AFAIK you just need to use a TLS cipherspec

________________________________
From: "Peter M Potkay (CTO Architecture + Engineering)" <***@THEHARTFORD.COM<mailto:***@THEHARTFORD.COM>>
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Sent: Tuesday, October 21, 2014 5:19:41 PM
Subject: Re: IBM MQ, SSL and the PODLE Attack

Would it be accurate to say
If your QM is running with SSLFIPS(YES) you are not vulnerable to POODLE, but you do not necessarily need to be SSL FIPS compliant to remediate the POODLE attack.

Peter Potkay

From: MQSeries List [mailto:***@LISTSERV.MEDUNIWIEN.AC.AT] On Behalf Of Neil Casey
Sent: Tuesday, October 21, 2014 4:58 PM
To: ***@LISTSERV.MEDUNIWIEN.AC.AT<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT>
Subject: Re: IBM MQ, SSL and the PODLE Attack

Hi,

thanks for your work, and for publishing the results.

I would just like to ask
 what was the cipher spec defined in the channel?

Successfully establishing an MQ channel requires more than just the SSL session. The negotiated cipher has to match the SSLCIPH value too.

Regards,

Neil Casey.


On 22 Oct 2014, at 4:48 am, Istvan M. <***@GMAIL.COM<mailto:***@GMAIL.COM>> wrote:

Hello List,

just tested on Linux with a small script provided by RedHat.

QMNAME(QM1V701) SSLFIPS(NO)
-bash-4.1$ ./poodle.sh
127.0.0.1:1414<http://127.0.0.1:1414/> - Vulnerable! SSLv3 connection established using SSLv3/AES128-SHA

QMNAME(QM1V701) SSLFIPS(YES)
-bash-4.1$ ./poodle.sh
127.0.0.1:1414<http://127.0.0.1:1414/> - Not vulnerable. Failed to establish SSLv3 connection.

poodle.sh: https://access.redhat.com/articles/1232123 at "attachments"

So enabling FIPS mode really solves this vulnerability.

On Mon, Oct 20, 2014 at 8:23 PM, Istvan M. <***@gmail.com<mailto:***@gmail.com>> wrote:
Hello List,

I've been waiting for this technote, really, we suspected that enabling SSLFIPS with a good cipher (TLS_RSA_WITH_AES_256_CBC_SHA for example, good for distributed, Z and i platforms) will eliminate this problem.
Now it's official. Tomorrow I'll test it. I assume Broker is also affected (seems no exceptions, everything is affected if it uses SSLv3).

On Mon, Oct 20, 2014 at 6:46 PM, Potkay, Peter M (CTO Architecture + Engineering) <***@thehartford.com<mailto:***@thehartford.com>> wrote:
This just came out from IBM on how MQ is impacted by POODLE:

http://www-01.ibm.com/support/docview.wss?uid=swg21687433&myns=swgws&mynp=OCSSFKSJ&mync=E


Still waiting for the WMB TechNote on POODLE.



Peter Potkay

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>
Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>
--
Üdvözlettel / Best regards,
Melich István / Istvan Melich
--
Best regards / Üdvözlettel,
MELICH, István

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>
Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>


________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>


________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>



<< "Once the game is over, the king and the pawn go back into the same box." - Anon >>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

************************************************************
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential and/or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, delete this communication and destroy all copies.
************************************************************

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

________________________________
List Archive<http://listserv.meduniwien.ac.at/archives/mqser-l.html> - Manage Your List Settings<http://listserv.meduniwien.ac.at/cgi-bin/wa?SUBED1=mqser-l&A=1> - Unsubscribe<mailto:***@LISTSERV.MEDUNIWIEN.AC.AT?subject=Unsubscribe&BODY=signoff%20mqseries>

Instructions for managing your mailing list subscription are provided in the Listserv General Users Guide available at http://www.lsoft.com<http://www.lsoft.com/resources/manuals.asp>

To unsubscribe, write to ***@LISTSERV.MEDUNIWIEN.AC.AT and,
in the message body (not the subject), write: SIGNOFF MQSERIES
Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://listserv.meduniwien.ac.at/archives/mqser-l.html
Loading...