Networking on z/OS
|
Previous topic |
Next topic |
Contents |
Glossary |
Contact z/OS |
PDF
Transport Layer Security (TLS) Networking on z/OS |
||||
|
Secure Sockets Layer (SSL) is a protocol standard developed by the Netscape Communications Corporation that uses encryption to provide confidentiality and authentication between two TCP/IP applications. As SSL gained in popularity, the IETF formally standardized SSL, made a few improvements and changed the name to Transport Layer Security (TLS). TLS is defined in Request for Comments (RFC) 2246. For simplicity, the acronym TLS is used to denote TLS and SSL in this section. A TLS connection begins with a handshake. As the name suggests,
the handshake entails the initial setup of a TLS connection. During the TLS
handshake, an exchange of information occurs that includes the following (this
has been simplified):
On z/OS, the FTP server, the FTP client, and the TN3270 server all support TLS. Configuration of TLS is similar in all three environments, and the principles involved are common throughout as well. RFC 2246 describes TLS in general–but FTP has the added complexity of a control and data connection. To clarify how FTP handles TLS, RFC 4217 has been published. An easy way to introduce the principles is by beginning with statements in the FTP.DATA file required to support a TLS connection; see Figure 1. Figure 1. FTP.DATA configuration
statements
CIPHERSUITE SSL_DES_SHA ;for testing, keep these cipher CIPHERSUITE SSL_RC2_MD5_EX ;cipher statements CIPHERSUITE SSL_RC4_MD5_EX ;in this order CIPHERSUITE SSL_3DES_SHA ;export restricted? SECURE_FTP REQUIRED SECURE_LOGIN NO_CLIENT_AUTH SECURE_CTRLCONN PRIVATE SECURE_DATACONN PRIVATE KEYRING FTPring By examining the statements in Figure 1,
the principles of setting up TLS become more apparent.
These parameters in the FTP.DATA configuration file control the behavior of the FTP server application. Because the TLS interface is be implemented at the top of the transport layer (as shown in Figure 2), the FTP server requires specific configuration changes in order to function with TLS. From an application programming perspective, the source code of the FTP server must be modified (by the original developer of the application) to operate using TLS. If the FTP server requires modifications to support TLS, what about the FTP client? The FTP client also requires similar configuration changes. Of special note, however is the certificate requirements. As noted, the FTP server sends out a certificate to prove its identity. How does the FTP client validate this certificate? In the FTP client key ring, there must be a certificate that can vouch for the authenticity of the certificate received from the FTP server. Normally, a Certificate Authority (CA) certificate is used for this purpose.
|
Copyright IBM Corporation 1990, 2010 |