450 likes | 649 Views
McAfee E-Business Server 7.1.1 Rob Heckman McAfee Security rheckman@nai.com. Agenda. Data Security E-Biz Server Introduction to Cryptography Using E-Biz Server Specific functions for OS/390 and z/OS B2B example. Defining the need for data security. What? Customer Information
E N D
McAfee E-Business Server 7.1.1 Rob Heckman McAfee Security rheckman@nai.com
Agenda • Data Security • E-Biz Server • Introduction to Cryptography • Using E-Biz Server • Specific functions for OS/390 and z/OS • B2B example
Defining the need for data security What? • Customer Information • Financial Data • Proprietary Company Information Where? • In Transit • In Storage • Outside the Organization • Inside the Organization Why? • Value of the Data • Reputation of the Company • Government Regulation • Cost Reduction Through Elimination of Leased Lines
Is data security important? Source: IDC 2000
Why is it important now? • INTERNET • B2B • Email • Online Shopping • Data on Personal PC’s and Palm type devices • Data on the Servers • Even though a product such as RACF can protect access to data, some people may still have access to it. • To get around this, it can be stored encrypted
What is McAfee E-Business Server? • Protects the security and integrity of your organization’s data and messages • In storage or in transit • Based on public/private key encryption • Uses PGP keys, X.509 certificates, Self Decrypting Archives • Encrypts information using key pair
What is McAfee E-Business Server? • Comprehensive Platform Choice • OS/390 and z/OS (Batch/TSO/USS) • Linux (including S/390 and zSeries) • Solaris • AIX • HPUX • Win32 • Additional Benefit when using INTERNET • Avoid have to use expensive private networks for communication • Avoid having to support multiple communication protocols
What is Cryptography? • Science of Securing Information • Using Mathematics to encrypt and decrypt data • Crypto analysis is the science of analyzing and breaking secure communication
Simple example • Julius Caesar • Used encryption to prevent his enemies from discovering his secrets and plans EHZDUH WKH LGHV RI PDUFK
Simple example • Julius Caesar • Encrypted his messages with the shift by 3 rule or key • Substituted all A’s with D’s, B’s with E’s, C’s with F’s, etc… • Unless you knew the key you wouldn’t be able to decrypt message BEWARE THE IDES OF MARCH
How does cryptography work? • Mathematical function or algorithm • Use a pass phrase to generate cipher text
What is a KEY? • Value that works with a cryptographic algorithim to produce a specific ciphertext • Essentially very large numbers • The bigger the key, the more secure the ciphertext • Two types of keys • Symmetric (session) • Asymmetric (public/private) • Cryptographic algorithims • Triple DES • IDEA • CAST • TwoFish
Conventional Cryptography • Secret key or symmetric key encryption
Conventional Cryptography • Benefits • Fast • Great for data not going anywhere • Drawbacks • Two people must agree on a key and keep it secret • If in two different locations, must trust courier • email? Phone? • Number of keys grows very quickly (n^2-n) • What is a solution?
Public key Cryptography • Asymmetric scheme that uses a pair of keys • Public and Private • Created by Whitefield Diffie and Martin Hellman in 1975 • Mathematical algorithm produces keys • Computationally infeasible to deduce private key from public key • Public key used to encrypt data • Private key to decrypt data • Three types • DSS • RSA • RSA legacy (no support for ADKs, designated revokers, photid)
Public key Cryptography • Publish your public key to world while keeping private key secret • Someone with your public key can encrypt information that only you can read using your private key • Gets around problem of key distribution • No need for bat phone or cone of silence to distribute keys • Allows people with no preexisting security arrangements to exchange data securely • All communications involves only public keys
Digital Signatures • Serves same purpose as handwritten signature • Let recipient of information verify • Authenticity • Verify the information’s origin • Data integrity • Information was not altered while in transit • Non-repudiation • Prevents sender from claiming the he or she did not actually send the information
Digital Signatures • Encrypt with your private key • If decrypted with your public key then it must have originated with you • Some people use signatures more than encryption
Problems with this implementation • Slow • Lots of data produced • Sometimes twice as much as original • Can improve by using one way hash • Hash function takes variable length data as input • Produces a fixed length output file say 160 bits • Eg: md5sum • Essentially a HASH function ensures that if even one bit changes in a file, the output will be different.
Key Management • Once you start encrypting and decrypting data, you will need to somehow manage your keys • Keys are just very large numbers • Concept of Keyring • Import public keys • When encrypting data, can choose key from ring • Can also store keys on key server
Digital Certificates • Issue with public key cryptosystems is that users must constantly make sure that they are encrypting to the correct person’s key • Form of credential • Drivers license, social security card, birth certificate, passport • Used to thwart attempts to substitute one person’s key for another
Digital Certificates • Digital certificate contains the following: • A public key • Certificate information • Name, user ID, etc • One or more digital signatures • Signed by CA • Essentially a digital certificate is a public key with one or more forms of id and a stamp of approval from some trusted individual or organization • Entrust • VeriSign • RSA • Simplifies the task of establishing whether a public key truly belongs to the purported owner • Used in SSL and VPN’s
Security Product needs to do the following • Data security during transit • Data security in storage • Authentication • Data integrity • Non repudiation • Key management
Using E-Biz Server • Generate and import keys • Key management • Encrypt Data • Decrypt Data • Digital signatures • X509 certificates
Generate key • pgp --key-gen • Need to input type of key • DS/DHH RSA RSA Legacy • Size of key • 1024 2048 3092 • Name of key • rheckman@nai.com • Passphrase • The leafs are going to win the cup this year
Manage keys • Import keys • --key-add filename_containing_key • Export keys • --key-export userid • Level of trust • --key-edit rheckman@nai.com --trust implicit • Default signing key • Change passphrase • --key-edit userid --change-passphrase • Key splitting • --key-split userid • KeyServer • --keyserver-fetch userid --keyserver <keyserver URL> • --keyserver-send userid --keyserver <keyserver URL>
Encrypting file • --encrypt inputfile --user user --output outputfile • where: • inputfile input file name (data you are encrypting) • user key name or id • outputfile output file name (where encrypted data goes)
Decrypt file • --decrypt cifrtext • In this case you will be prompted for user/keyid as well as passphrase • where • cifrtext encrypted file
Signatures • pgp --sign filename --user rob1 --output outfile • This will sign a file • pgp --encrypt --sign filename --user rob1 • This will sign and encrypt a file
Certificates • Add CA’s certificate to keyring • pgp --key-add file_containing_CA_certificate • Requesting certificate • pgp --cert-request keyid • Retrieving and adding certificate • pgp --cert-retrieve keyid
Considerations for OS/390, z/OS • ASCII EBCEDIC • --text • --encrypt filename –text • Allows file to be decrypted on any platform • Takes care of line ends and ASCII/EBCEDIC issues • Need to send binary • --armor • --encrypt filename –armor • ASCII-armored format • Suitable for transport thru mail gateways • Send as ASCII, not binary • --text and –armor • --encrypt filename –text –armor • Probably most important set of options • Need to send as ASCII, not binary
Config file options specifically forOS/390 and z/OS • TEMPFILENAMETEMPLATE • USEICSF • STORAGECLASS • MANAGEMENTCLASS • DATACLASS
TEMPFILENAMETEMPLATE • Specifies the template for name temp datasets • Some shops have unique environments • ACS routines may prevent standard temp file name • HLQ and userid may not match EG: TEMPFILENAMETEMPLATE=‘P390X.ABC%%%%%.DEF%%%%%’
SMS controls • STORAGECLASS • Specify which storage class to use for temp files • MANAGEMENTCLASS • Specify which management class to use for temp files • DATACLASS • Specify which data class to use for temp files • NUMBEROFVOLUMES • Specify how many volumes can be used for multivolume temp files
USEICSF • Allows E-biz Server to exploit crypto hardware found on most IBM mainframes • USEICSF=ON default • Used for 2 reasons • Provide entropy for key generation • Avoid having to randomly press keys when providing entropy for key generation • Encrypt file with a 3des key • Depending upon data can substantially improve encryption time
B2B example • Encrypt text file on OS/390 and send to Bank_of_Toronto (Win 2K platform) • Pgp –encrypt –sign filename –text –armor –outout output file • Prompted for user to encrypt to and passphrase of signing key • ftp Bank_of_Toronto • Ascii • Put filename myfilename • Decrypt text file on Win2k (Bank_of_Toronto) • pgp --decrypt myfilename • Prompted for passphrase
References The Code Book: Evolution of Secrecy from Ancient Egypt to Quantum Cryptography ISBN 0385495323 The Codebreakers: The Story of Secret Writing ISBN 0-684-83130-9 Applied Cryptography: Protocols, Algorithms, and Source Code in C ISBN 0-471-12845-7
Technical aspects of cryptography • www.iarc.org International Association of Cryptologic Research • www.pgpi.org International pgp website • www.nist.gov/aes National Institute of Standards and Technology