21
Sat, Dec
3 New Articles

Open Source and IBM i Security

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Don’t take your eye off the security ball when it comes to open source.

I’ve had a few conversations in the last few weeks about open-source solutions on IBM i. While I’m an advocate and even sometimes a cheerleader for open solutions, these conversations have left me with concern about IBM i security. Don’t get me wrong; progression toward the open-source world is needed in our community. It opens up doors to hire new people with new ideas and sets them up to become productive as developers very quickly. We’re given the opportunity now, at this point, to do arguably what we’ve not been able to do as a community with our traditional applications written in RPG: enforce rudimentary object-level controls and not give away the keys to the kingdom with special authorities.

I came upon a conversation in which a vendor required the ability to securely transfer files to an IBM i partition. A number of people advocated using SSH and a chroot jail to ensure that the vendor is accessing only the directory structure assigned to him.

Couple of issues here.

First, I guarantee that if you turn on the SSH server and allow a NAT rule through your firewall to your IBM i, it will be hit with brute force password dictionary attacks within a couple of hours and continue all day, every day. Congrats! You’ve just made your IBM i a target on the public Internet. If you do implement SSH, you must ensure that any source IP addresses are from trusted sources, even on your internal network. Ensure that your firewall is limiting this traffic as a matter of risk reduction. Or even better, don’t allow a vendor direct access to your IBM i at all! Have them put files on a meaningless Windows server instead and then transfer to your IBM i via a more secure, internal option that you can control. Otherwise it’s a free-for-all.

I propped up a dummy server with SSH running with access from the public Internet last week to prove a point. Within a couple hours the server was subject to a dictionary attack. How did I know? The audit journal can capture invalid password attempts.

Source IP

User

Timestamp

87.27.141.42

ROOT

7/2/20 12:32 PM

49.88.112.71

ROOT

7/2/20 12:33 PM

206.189.26.171

SERVER

7/2/20 12:33 PM

199.231.185.120

ELENA

7/2/20 12:33 PM

145.239.87.35

NICO

7/2/20 12:33 PM

151.80.41.64

DANIEL

7/2/20 12:33 PM

119.28.177.36

ROBIN

7/2/20 12:33 PM

94.103.94.203

TEST

7/2/20 12:33 PM

65.31.127.80

SAMBA

7/2/20 12:33 PM

1.202.76.226

COSMO

7/2/20 12:33 PM

51.83.74.203

ROOT

7/2/20 12:33 PM

103.242.56.174

ORACLE

7/2/20 12:33 PM

157.230.10.212

RAFAL

7/2/20 12:33 PM

60.30.98.194

Q12345

7/2/20 12:33 PM

167.71.86.88

THOMAS

7/2/20 12:34 PM

199.231.185.120

MOHAMED

7/2/20 12:34 PM

49.88.112.71

ROOT

7/2/20 12:34 PM

51.83.44.111

ROOT

7/2/20 12:34 PM

62.234.110.91

SII

7/2/20 12:34 PM

5.196.64.61

POSTGRES

7/2/20 12:34 PM

51.15.80.231

ROOT

7/2/20 12:34 PM

51.178.52.56

SHIPPING

7/2/20 12:34 PM

145.239.87.35

BOT

7/2/20 12:35 PM

199.231.185.120

TEMPORAL

7/2/20 12:35 PM

117.247.226.29

MINECRAFT

7/2/20 12:35 PM

37.187.113.144

ROOT

7/2/20 12:35 PM

119.28.177.36

ROOT

7/2/20 12:35 PM

49.88.112.71

ROOT

7/2/20 12:35 PM

138.197.222.141

QDP

7/2/20 12:35 PM

1.202.76.226

ROOT

7/2/20 12:36 PM

51.68.122.147

SUPPORT

7/2/20 12:36 PM

If you’re not watching for this stuff, your systems are getting probed and prodded all day long. Eventually, either valid accounts can be locked out that could potentially cripple a production process or a password attempt will succeed, especially if you allow *NOMAX for your QMAXSIGN system value.

Second, chroot is not a security measure. And yes, I’ll die on this hill. Chroot does not stop a user from interacting with QSYS, which means a chrooted user can call programs there. There are a number of documented methods on how to break chroot without needing root authority. Chroot can certainly help slow down an attacker, but it will not stop one. It’s a baby gate. It’ll work until someone learns how to climb over it.

Third, object authority must be taken seriously. I don’t care if you’re using file shares, FTP, FTPS, or SSH/SFTP. If a user interacts with the IFS, then object security on those directories will be your saving grace…or at least give you a fighting chance at minimizing damage. That means connected user profiles also get zero special authorities. If you condemn users to operate inside one directory structure by way of object security, then their potential damage is limited.

That leads me to the next issue: developers with *ALLOBJ.

By default, the ability to set up open-source solutions in the default directories on IBM i requires an IBM-recommended *ALLOBJ authority. Here’s where something like chroot can come in handy. You can load instances of IBM i open-source solutions into different chroot directory containers. With proper authority on those directories, your developers can work inside there and even update their OSS packages themselves.

Or you can just give developers *ALLOBJ authority.

I was privy to another conversation this past week in which an IT manager didn’t want to keep SSH running or have it auto-started via the job scheduler, but he was completely fine with a contract developer having *ALLOBJ special authority and the ability to start it whenever required. This stuff makes my head implode.

Security is all about risk reduction.

SSH is used to facilitate terminal shells (i.e., Bash, etc.) and is a preferred environment to work with open-source tools. There are no exit points associated with SSH, so monitoring and controlling what users do inside SSH is a problem. I already mentioned and demonstrated above that it’s a major attack vector.

Developers with *ALLOBJ own the entire system. Period. Full stop.

Not to say that developers are malicious. Of course not. But they’re human and are subject to human mistakes. It’s the equivalent to logging into a Linux distribution as root and then doing development.

I would argue that allowing developers the ability to start/stop TCP servers is a mistake. In my opinion, that’s not in their job description. Developers should be given rights to development libraries/directories only, and then code should be promoted to production by way of proper change-management procedures.

Developers with *ALLOBJ pose a far bigger risk than allowing SSH if you accept only connections from specific source IP addresses either on the system by way of packet rules or via the firewalls, where I would argue that type of rule really belongs.

Again, risk reduction is the name of the game. It’s a multipronged approach that needs attention now before there’s 32 years’ worth of open source security doors we need to close in addition to the ones we have now.

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: