MQ

MQ

Join this online group to communicate across IBM product users and experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only
  • 1.  using SSL in MQ but allow also none ssl connection

    Posted Mon July 31, 2023 05:17 AM
    Edited by rniew Mon July 31, 2023 05:28 AM

    We need to configure SSL at queue manger level (cleint>Qmgr and qmgr > qmgr). To do so we must:

    1. Manage the digital certificates that are used by the queue manager.
    2. Configure the queue manager for SSL-enabled messaging.
    3. Configure channels to support secure messaging using SSL.

    But we also need to allow none SSL connection through 1414.
    Is it possible? Do we only need to define new channels without SSLCIPH and use those  to connect? Or simply set SSLCAUTH(OPTIONAL)?

    Best regards + thanks



    ------------------------------
    rniew
    IT Spe
    IBM
    (49171) 722-9761
    ------------------------------



  • 2.  RE: using SSL in MQ but allow also none ssl connection

    Posted Mon July 31, 2023 05:31 AM

    hello, 

    Once a certificate has been assigned to the Queue Manager, TLS (SSL) is activated at channel level.
    It is therefore possible to have TLS on a channel with a cipherspec 1, another with a cipherspec 2, and a third without a cipherspec.
    The listening port is set at the listener level, which does not know the TLS status, so it is not possible, for example, to have SSL communications via 1515 and unencrypted communications via 1414.

    However, be careful about leaving one channel non-TLS when the others are, it's a bit like having an armoured door in front of the house, and the back door on the garden side closing with a simple hook.



    ------------------------------
    Luc-Michel Demey
    DEMEY CONSULTING
    lmd@demey-consulting.fr
    #IBMChampion
    ------------------------------



  • 3.  RE: using SSL in MQ but allow also none ssl connection

    Posted Mon July 31, 2023 06:08 AM

    Hello Luc.

    So SSLCAUTH(OPTIONAL) on a CERTLABL enabled Channel, does not make sense either. 

    We need to discuss it with the requesting team.

    Thanks!



    ------------------------------
    rniew
    IT Spe
    IBM
    (49171) 722-9761
    ------------------------------



  • 4.  RE: using SSL in MQ but allow also none ssl connection

    Posted Mon July 31, 2023 06:33 AM

    SSLCAUTH(OPTIONAL) enables one-way encryption to be used, i.e. :
    - the local Queue Manager has a certificate
    - the remote MQ client or Queue Manager does not have a certificate
    - the link is encrypted using TLS

    However, in this case, the remote side must have a certificate store with the roots certificates that signed the local certificate, so that it can be verified.



    ------------------------------
    Luc-Michel Demey
    DEMEY CONSULTING
    lmd@demey-consulting.fr
    #IBMChampion
    ------------------------------



  • 5.  RE: using SSL in MQ but allow also none ssl connection

    Posted Mon July 31, 2023 06:50 AM

    To add to what Luc-Michel says above,

    SSLCIPH controls whether a channel expects encrypted communication or not. A blank value indicates you want clients (apps or queue managers) to connect with plaintext. Any other value indicates you want encrypted communication and sets what CipherSpec (or in the case of alias: Cipherspecs) are valid for clients to connect with. Any mismatch will result in a channel terminating the connection.

    SSLCAUTH is what Luc-Michel says above, the communication will be encrypted with TLS so long as SSLCIPH is not blank but SSLCAUTH controls whether the connecting client has to provide a valid certificate for identity or not

    • (OPTIONAL) indicates that you don't expect one, allowing anonymous connections, but if one is supplied it has to be valid.
    • (REQUIRED) indicates you require one and will reject clients that do not provide a valid certificate.

    Finally, CERTLABL is a special case, this is set to override what certificate your queue manager server will provide to connecting clients during the TLS handshake. It overrides the CERTLABL setting on the QMGR object. So if your queue manager is configured to present a certificate with DN "CN=QMGR" then you can use CERTLABL to change that to a different certificate

    In all cases. CERTLABL and SSLCAUTH are redundant, haivng no effect, if SSLCIPH is blank.



    ------------------------------
    Rob Parker
    Security Architect, IBM MQ Distributed
    IBM UK Ltd
    ------------------------------



  • 6.  RE: using SSL in MQ but allow also none ssl connection

    Posted Mon July 31, 2023 01:50 PM

    Adding value to the channel attribute property SSLCIPH will block all NON SSL/TLS.

    SSLCIPH: Select a value from the list of CIPHERs.



    ------------------------------
    om prakash
    ------------------------------