23
Sat, Nov
1 New Articles

Security Patrol: V7R2 Security Enhancements, Part 1

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Carol provides the first part of a two-part article on the security enhancements introduced in V7R2.

 

Each new release of IBM i provides some enhancements, but this version provides a plethora of security-related enhancementsso many that I need two articles to cover them all! I'll start with the areas that have been "tidied up."

 

Have you ever looked around your house and realized that several rooms or appliances could use updating? Perhaps your furnace is below the current building codes for efficiency. It's functional but not up-to-date. Several enhancements in V7R2 fall under this category:

  • Cipher algorithms used for SSL have been brought up to industry standards. Older algorithms have been removed, and the order in which the algorithms are negotiated on a connection have been adjusted. You can see these changes by displaying the QSSLCSL system value.
  • A new version of Java has been included.
  • Web servers have been brought up-to-date, including new authentication methods, updated encryption support, and the ability to run two websites on the same servereach with their own digital certificate (rather than having to use the same certificate for both).
  • Portable Application Solutions Environment (PASE) has been updated to run the most current AIX version (V7.1).
  • The OpenSSL version in use within PASE is now V1.01g. Don't worry; this is not the version with the Heartbleed bug!
  • If you're using the IBM i VPN feature, IKEv2 NAT (Network Address Translation) support is now available as well as advanced Internet Key Exchange (IKE) and Internet Protocol security (IPsec) encryption algorithms. 

Changes to User Profiles

Create/Change/Display User Profile commands have a new parameter to support the new maximum storage allowed for a user profile. I'm sure the limit was being reached for application profiles owning terabytes of data when a value was specified. The new parameter is Maximum Storage Large (MAXSTGLRG). Note: if the value in the current Maximum Storage (MAXSTG) parameter is *NOMAX, no changes are required. However, if you are using the Retrieve User Profile command or API to retrieve the storage used, you may want to change to retrieve the MAXSTGLRG attribute rather than the MAXSTG attribute.

 

The next enhancement is not to the profile itself but has an effect when creating or changing user profiles. A new value was added to the list that can be specified for the QPWDRULES (password rules) system value. This value, introduced in V6R1, provides more options for specifying password composition rules and replaces some of the system values that require you to specify password composition rules individuallyfor example, you can use the *MAXLENx and *MINLENx values in QPWDRULES to replace the QPWDMAXLEN and QPWDMINLEN system values. While the QPWDRULES system value and its options were introduced to provide the ability to more easily match the password requirements of your network or other corporate password rules, the new value introduced in V7R2 has meaning only in the IBM i world. The new value is *ALLCRTCHG, and it means that all passwordseven those specified when creating a user profile or changing a user profilehave to meet the password composition rules. This means that if you specify *ALLCRTCHG along with *LMTPRFNAME, no profiles can be created or changed to have a default password! Hallelujah! But wait. Before we celebrate too much, there are a couple of issues that need consideration. First, vendors take note! If you are creating a profile when you install your software, you'll no longer be able to create it with a default password. Leaving it at the default will cause the profile creation to fail. So create your profiles without a password (that is, set the password parameter to *NONE) and you'll be good to go. While all of us (with the possible exception of the vendors) are thrilled by the prospect of eliminating vendor profiles with default passwords, there are potential side effects that you'll want to think through. Consider your user profile creation process. You'll no longer be able to create a profile with a default password. You'll have to come up with a password that meets the password criteria and communicate that to the person for whom you're creating the profile. You'll still want to require the users to change their passwords the first time they log on, but the initial process of creating the profile and communicating the password might have to be altered. Second are password resets. The typical scenario is that the users forget their passwords, attempt to sign on until the profile is disabled, and then call the help desk to get a password reset. The process is typically that the profile is enabled, the password is set to something simple, and the indicator is set so the user will have to change it when signing on. That part about setting the profile to something simple will have to be modified. The password will have to match all composition rules. So while I'm thrilled with this enhancement to QPWDRULES and will be recommending its use to our customers, it will come with the warning that user profile processes first be reviewed and updated if necessary.

 

A side note about QPWDRULES: once you add a value to QPWDRULES, the system values that let you define individual rules are ignored; therefore, you must add all of your composition rules to the list in QPWDRULEs.

Auditing Updates

Several changes have been made to the IBM i auditing features.

 

Two new values are available to specify for action auditing in the QAUDLVL system value. These are *PTFOBJ (Changes to PTF objects) and *PTFOPR (PTF operations). The reports you can generate from these values will be great as proof of compliance to your auditors or other regulatory agencies that want to see the implementation of your "patch strategy" or, in IBM i terms, your strategy for when you apply PTFs.

 

New audit journal entry types have been added: AX (Row and Column Access Control, which will be discussed next month), PF and PU (to support the new PTF values described above), and X2 (Query Manager Profile changes.)

 

Several existing audit journal entries have been enhanced to provide the "before" values for security attribute changes. Some audit entries, such as the SV (system value) entries and the OW (ownership change) entries already include the previous values. In V7R2, the following entries also include the previous setting:

  • ADAuditing value changes
  • AUAttribute changes
  • CAAuthority changes
  • CPUser profile changes (Note: only the previous special authority values have been added)
  • DIDirectory server
  • GRGeneric record (added changes to the function usage (Application Administration) settings)
  • PAProgram adopt
  • PGPrimary group changes
  • RARestore object authority changes (added the name of the authorization list)
  • RJRestore job description (added name that had been specified in the job description)
  • ROOwnership changes for restored objects
  • RZPrimary group changes for restored objects

 

The ST entry had information added for when storage gets modified through the use of service tools. And finally, other audit entries have been taken out of commission. They were for some APPN functions that are no longer supported.

 

For details of these updates, see Appendix F in the IBM i Security Reference manual.

Miscellaneous Enhancements

You have long been able to use Kerberos as an authentication method to Telnet from your PC to an IBM i session. (Kerberos is the authentication method used when implementing Single Sign-on on IBM i.) What's been missing is the ability to Telnet from one IBM i to another using Kerberos. That functionality was added in V7R2. Another piece that was missing was the ability to use Kerberos to initiate an FTP session. That ability is now also available, both for the FTP client and the FTP server running on IBM i.

 

Work with Objects by Owner (WRKOBJOWN), Work with Objects by Primary Group (WRKOBJPGP), and Work with Objects by Private Authorities (WRKOBJPVT) now have an object type parameter so you can narrow the scope of objects you're working with.

 

Transport Layer Security (TLS) versions 1.1 (TLSv1.1) and 1.2 (TLSv1.2) are now available.

 

Online Certificate Status Protocol (OCSP) is now supported. OCSP provides a method for determining when a digital certificate has been revoked. For example, when a Certificate Authority (CA) is compromised, both the CA's certificate and certificates issued by that CA may be added to a revocation list.

 

Digital Certificate Manager (DCM) has been enhanced to provide configuration options for SSL for existing applications as well as the ability to assign multiple certificates to the same server.

 

In addition to bringing the SSL algorithms up-to-date, encryption operations using the AES and SHA-2 algorithms will see a performance boost on POWER8 hardware. These gains will manifest themselves in applications using the crypto services APIs, software tape encryption, and system-provided SSL and VPN connections. Note that this is a crypto accelerator and is not a replacement for the hardware encryption card, which provides encryption key storage.

The Best for Last

While some of the enhancements I've discussed here are genuinely welcome, I have definitely saved the best and most exciting enhancements for next month's column. Until then, I'll let you gain an understanding of these enhancements. Read about these and other changes in the Memo to Users and start your plans for upgrading to V7R2.

 

Carol Woodbury

 

Carol Woodbury is IBM i Security SME and Senior Advisor to Kisco Systems, a firm focused on providing IBM i security solutions. Carol has over 30 years’ experience with IBM i security, starting her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies: SkyView Partners and DXR Security. Her practical experience and her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security topics. She has written seven books on IBM i security, including her two current books, IBM i Security Administration and Compliance, 3rd Edition and Mastering IBM i Security, A Modern, Step-by-Step Approach. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

Mastering IBM i Security Mastering IBM i Security
Get the must-have guide by the industry’s #1 security authority.
List Price $49.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: