21
Thu, Nov
1 New Articles

In the Wheelhouse: Your IBM i Data Is Insecure

Commentary
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Chances are, you're looking at that title and thinking it's just click bait. Of course, I'm not talking about your data. Right? Wrong.

 

I was at the COMMON User Group Fall Conference in Orlando earlier this month. I had debuted a session called Rapid Fire Admin, which was just a ridiculous 150 IBM i administration tips in 75 minutes. I actually did it with 15 seconds to spare!

 

In my session, I had a couple of tips in there about security, and based on some feedback I received, I decided to put together an article to pinpoint a few areas of concern that we all need to understand.

 

My apologies for interrupting the current "CAMSS in Conversation" series. However, with security being the overriding theme on each of Cloud, Analytics, Mobile, and Social aspects, it seems fitting to provide a real-life example of just how much we have a false sense of security about our systems.

 

First, I had a couple of slides highlighting a few items mentioned in the PowerTech 2015 State of IBM i Security study. The thing that struck me as most alarming was the percentage of user profiles with specific special authorities. This should scare the living hell out of you.

 

Given that the average system size in that study was about 1090 users, it should be quite a shock that special authorities are at a cavalier level. For instance, approximately 15 percent of user profiles have Spool Control (*SPLCTL) and approximately 20 percent have Job Control (*JOBCTL).

 

So what's wrong with *SPLCTL? Nothing of course, because no IBM i shop runs any form of payroll software or generates financial statements or employee checks, right? Users with *SPLCTL own your output. Make no mistake about it. If you've spooled the secret proprietary recipe full of secret ingredients to an output queue, then it's vulnerable. In fact, in my humble opinion, it's a breach given the fact that it could've been very easily compromised by 15 percent of your users and you'd never be the wiser.

 

*JOBCTL has pretty much the same capabilities but with a few added goodies. You can control jobs plus printers and spooled files. If an output queue is operator controlled *OPRCTL(YES), then someone with *JOBCTL has access to that queue, no matter how sensitive the data is. The great rub about *JOBCTL is the ability to start and stop subsystems and even the ability to power down a partition.

 

Think about that. Nearly 20 percent of users have the authority to power down a partition.

 

Now, I'm fully supportive of ensuring user profiles are secured. I'm also 110 percent behind most, if not all, the recommendations in the PowerTech study. I'm a big fan of password phrases instead of short passwords. We need to be using complex password rules and forcing changes. Every IBM i admin should download that study and have a good, hard look at their IBM i security.

 

Chances are, you've got user profiles with far more authority than they should have. What's the biggest reason we don't want to change those profiles? It usually goes like this: "I know Donald has essentially the same authority as QSECOFR. He's got all special authorities, but he's been here for 25 years. He'll be retiring soon, and if he wanted to cause any damage, he would have already. Changing his authority will just be a make-work project. Plus he runs all the payroll jobs and keeps an eye on the QSYSOPR queue for us. If we change his authority, we could break payroll!"

 

It's the don't rock the boat answer. It's also the bury our heads in the sand answer. First, the fear of breaking something should not be in our vocabularies as technology professionals. Second, would you rather Donald accidentally break payroll or even something worse when you're not looking and then tell you about it later when the crime scene is cold? No. The best thing we can do is to do a controlled experiment on profile authority reduction. This is a perfect guest partition test actually. We need to be breaking things (potentially, or course) and precisely when we're going to be watching the systems.

 

And about Donald? Donald will continue to work for another 10 years. He hasn't caused any damage yet…or at least none that you know about. His password is "judy," which happens to be his wife's name, and she works right next to him. How common is this? I'd argue it's far more common than we'd like to admit. Now just think about how easy it is for a layman to gain access to payroll.

 

You're only as secure as your weakest link.

 

No matter what you do to secure your system from the inside and no matter how complex you make your passwords, it won't make much difference if you're sending all your Telnet traffic unencrypted.

 

One of the big eye-openers for me was when I asked my session attendees to raise their hands if they encrypted their Telnet traffic. Out of a room of approximately 30 people, I saw two hands come up. And one of those doesn't count because he's Larry Bolhuis. You know Larry does admin right. So I'm only counting one out of 30. That means 97 percent of that room is sending data, including their user IDs and passwords, via plain text.

 

This is a major red flag.

 

Why are we not encrypting Telnet traffic? Maybe it's because you couldn't really sniff a twinaxial line 20 years ago. When we all converted to TCP/IP, we just didn't secure it from the start.

 

How bad is it? All we need is one curious person on our network with a copy of Wireshark, and anything on the network sent to and from an IBM i partition is fair game to sniff.

 

How easy is it to sniff data in plain text? Have a trusted security-minded person on your team download a copy of Wireshark and find out. You may be very surprised at what you pick up.

 

How easy is it to remedy? Incredibly. So much so that there isn't any reason not to do it.

 

This type of solution doesn't break things. It's very similar to securing any other service with SSL that's running on IBM i or any operating system. Would you create an online payment system over HTTP rather than use HTTPS? Or transmit B2B data in plain text via FTP instead of SSH? Of course not. If the data is confidential, then it's irresponsible to send it in a clear-text manner over the public Internet. We live in an age of data security and data integrity. Breaches cost money and a loss of trust. Considering most breaches come from within the organizational walls, then that's where we need to be starting.

 

IBM i is designed with security in mind. It's got the capabilities to be one of the most secure operating systems in existence. The problem is that many of us haven't changed and assume we're protected based on the way our technology used to behave. Our auditors come to the doors and ask generic security questions because many of them have no idea how IBM i security works. Then the auditor gets sent info about how secure the AS/400 was designed and is satisfied...based on 1988 information. I've seen that happen a few times in a few shops by reputable auditors. Again, they're not IBM i auditors. I've hired groups like SkyView Partners and PowerTech in the past, and the difference between them and financial auditing companies is that they understand IBM i from a modern perspective. I'd argue IBM i audits should happen in addition to standard financial and IT audits, or at least every few years to ensure things haven't run off the rails.

 

IBM i has changed with the times to ensure our risk is reduced, but it doesn't matter if we don't take advantage of those changes.

 

SSL-enable your Telnet. Please.

Steve Pitcher
Steve Pitcher works with iTech Solutions, an IBM Premier Business Partner. He is a specialist in IBM i and IBM Power Systems solutions since 2001. Feel free to contact him directly This email address is being protected from spambots. You need JavaScript enabled to view it..
BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: