Course Overview © Copyright IBM Corp. 2011 . Introduction Overview • Welcome to Sterling Connect:Direct Secure Plus Option class. Let us take a moment to introduce ourselves, starting with the instructor. When you introduce yourself, please share the following information: Your motivation for taking this course Your name and company information © Copyright IBM Corp. 2011 2 Facilities © Copyright IBM Corp. 2011 3 Course Agenda Module A: Introduction to Security Processing • Lesson 1: Security Essentials for Data Movement • Lesson 2: Creating and Maintaining Certificates and Keys Module B: Introduction to Sterling Connect:Direct Secure Plus • Lesson 3: Sterling Connect:Direct Secure Plus Overview Module C: Secure Plus Configuration for WINDOWS • Lesson 4: Sterling Connect:Direct Secure Plus Configuration Walkthrough for SSL Module D: Execution and Troubleshooting • Lesson 5: Secure Data Exchange, Modify Sterling Connect:Direct Secure Plus Option and Troubleshooting • Course Wrap Up © Copyright IBM Corp. 2011 4 Questions Please ask questions at any time! The instructor will place questions that cannot be answered immediately on the white board for further investigation. The instructor will get the answer to these questions as soon as possible. © Copyright IBM Corp. 2011 5 Module A: Security Processing © Copyright IBM Corp. 2011 . Module A: Security Processing This module includes the following lessons: • Lesson 1: Security Essentials for Data Movement • Lesson 2: Creating and Maintaining Certificates and Keys © Copyright IBM Corp. 2011 7 Lesson 1: Security Essentials for Data Movement © Copyright IBM Corp. 2011 . Lesson Objectives This lesson has been designed to enable you to: • Explain the aspects of security • Identify key terminology used it data security • Define cryptography • Provide an overview of encryption • Explain the various types of cryptography • Explain digital certificates • Provide an overview of public key infrastructure © Copyright IBM Corp. 2011 9 The Pyramid of Trust Proof of Participation Non-Repudiation Data Integrity Message Alteration Confidentiality Snooping Unauthorized Access Access Control Fraud Authentication © Copyright IBM Corp. 2011 10 Authentication Authentication is the process of ensuring the identity of participants exchanging information. Authentication prevents impersonation and provides assurance that participants are legitimate. Examples: • Friend recognizes friend’s voice on the phone. • Present driver’s license when making credit card purchase. • Computer network user must enter the correct password for access. © Copyright IBM Corp. 2011 11 Access Control Access control grants the authenticated user access to resources and function based on pre-assigned rights or privileges. Examples: • Reading or writing files • Executing programs • Access physical devices network drives and printers © Copyright IBM Corp. 2011 12 Confidentiality – Data Encryption Confidentiality ensures that a document is viewable only by the intended recipient. Examples: • A locked filing cabinet contains sensitive files. Only personnel permitted to read the files have a key to the filing cabinet. • An electronic example would be that data special program is required to view the data. Accomplished by using a key to mathematically scramble data in order to make the data unusable by anyone other than the intended recipient • • • • DES 3DES IDEA AES © Copyright IBM Corp. 2011 13 Data Integrity Data integrity ensures that any alteration to data that occurs during transmission is detected by the recipient. It helps prevent electronic theft and vandalism. Accomplished through Cryptographic Hashing • A mathematical summary of the entire message The Cryptographic hash must have the following features • • • • Any length input creates a fixed length output Easy to compute One way (hard to invert without the proper key) Is not secure by itself because algorithms are public Popular Hashing Algorithms are – • • Message Digest (MD2 / MD5 – 16 byte hash) Secure Hash Algorithm (SHA – 20 byte hash) © Copyright IBM Corp. 2011 14 Non-Repudiation Non-repudiation ensures that the sender of a message cannot later deny having sent the message to the recipient. It provides a “proofof-participation” where the exchange of message forms a legally binding transaction. A method of ensuring (which cannot later be denied) that data was sent by the intended individual or company Accomplished by using – • Digital Signature (STS) Encrypts • the Message Digest using a Private Key MAC (TLS / SSL) Encrypts 160 the Message Digest using a “Shared Secret” Key of bits for SHA and 128 bits for MD5 Can be legally binding © Copyright IBM Corp. 2011 15 Cryptography Cryptography is the art and science of keeping information secure through mathematical processes. It helps ensure only authorized individuals have access to sensitive information. Cryptography helps ensure information is not altered by unauthorized individuals. • The science of Data Encryption / Decryption • Conceals data from unauthorized observers • Relies on a mathematical key to transform the data • Can encrypt data only or be part of an Encryption System © Copyright IBM Corp. 2011 16 Encryption Encryption converts readable messages to an unreadable form using a mathematical process. Decryption converts encrypted messages back to their readable form. Decryption relies on a secret key. The secret is the key, not the algorithm. There are three types of Data Encryption – Symmetric, Asymmetric, Hybrid Encryption © Copyright IBM Corp. 2011 17 Symmetric Key Encryption Symmetric Key Key Plaintext Key Encryption Decryption Ciphertext Bob receives Alice sends © Copyright IBM Corp. 2011 18 Plaintext Asymmetric (Double Key) Plaintext Public Key Private Key Encryption Decryption Ciphertext Bob receives Alice sends © Copyright IBM Corp. 2011 19 Plaintext Hybrid Cryptosystem Use symmetric and public/private keys Symmetric keys • Faster processing due to faster symmetric algorithm • Use for “bulk” encryption processing Public/private keys • Less vulnerable to compromise because key functions are separated between two keys • Use for authentication and encrypting symmetric keys for key exchange © Copyright IBM Corp. 2011 20 Encryption Key Lengths Algorithm Key Length Symmetric RC2 (Secret) RC4 Asymmetric 40.64.128 DES 56 Triple DES 112 RSA 512, 1024, 2048 (Public/Private) © Copyright IBM Corp. 2011 21 Message Digest Unencrypted Document © Copyright IBM Corp. 2011 22 Creating a Digital Signature 1. Alice creates a message for Bob 2. Alice signs document to protect information Dear Bob, Why don’t you send me a message sometime? 3. Alice sends the signed message to Bob Behind the scenes: A. MD5 creates a hash (011010) Dear Bob, Why don’t you send me a message sometime? © Copyright IBM Corp. 2011 B. Alice encrypts the hash with her private key creating a message signature that is attached to the file 23 Dear Bob, Why don’t you send me a message sometime? *&%#@ (011010) Verifying a Digital Signature 1. Bob receives message 2. Bob verifies Alice’s signature 3. Bob reads Alice’s message Dear Bob, Why don’t you send me a message sometime? Behind the scenes and transparent to user: A. Bob then decrypts the hash code using Alice’s PUBLIC-Key B. Hash message again with MD5 and compare to original hash 011010 Dear Bob, Why don’t you send me a message sometime? 011010 © Copyright IBM Corp. 2011 24 Digital Certificates Certificate Owner Identification Certificate Authority (CA) Identification Date range certificate is valid • Start date • End date Public key of owner Serial number Possibly other information X.509 most widely used format © Copyright IBM Corp. 2011 25 Public Key Infrastructure Services Crosscertification Automatic key update Certification authority Key registration Application software Certificate repository © Copyright IBM Corp. 2011 Key backup & recovery Certificate revocation 26 Vendor Certificate Authorities Verisign • Digital Id is their term for digital certificate • Provide CA function of processing CSRs and issuing certificates Thawte • Now owned by Verisign • Provides CA function to process CSRs and issue certificates as well © Copyright IBM Corp. 2011 27 Requesting a Certificate 1. Alice creates a CSR. 2. Alice sends CSR via E-mail to CA. Please send certificate. Please send certificate. 5. Alice receives new certificate. 4. CA sends certificate back to Alice. Please send certificate. © Copyright IBM Corp. 2011 3. CA validates CSR and creates certificate. 28 Validating a Certificate 1. Alice sends Bob certificate to authenticate her messages. 2. Bob verifies CA root signature on certificate. Alice’s Certificate Alice’s Certificate 4. Bob verifies the message with Alice’s public key from her certificate. 3. Alice sends Bob a message. Hi, Bob! Hi, Bob! © Copyright IBM Corp. 2011 29 Lesson Summary This lesson was designed to enable you to: • Explain the aspects of security • Identify key terminology used it data security • Define cryptography • Provide an overview of encryption • Explain the various types of cryptography • Explain digital certificates • Provide an overview of public key infrastructure © Copyright IBM Corp. 2011 30 Lesson 2: Creating and Maintaining Certificates and Keys © Copyright IBM Corp. 2011 . Lesson Objectives This lesson has been designed to enable you to: • Describe the purpose of the Certificate management tools • Navigate through the certificate wizard to create a self-signed certificate • Generate a certificate signing request • Send signing request to Thawte • Receive certificate from Thawte into certificate database © Copyright IBM Corp. 2011 32 Key Management Tools SSL Connections use public/private key mechanisms for authenticating each side of the SSL session and agreeing on bulk encryption keys to be used for the SSL session. To use public/private key mechanisms (termed PKI), public/private key pairs must be generated. In addition, X.509 certificates (which contain public keys) may need to be created, or certificates must be requested, received, and managed. © Copyright IBM Corp. 2011 33 Exercise: Creating a Self-Signed Certificate Use Certificate Wizard to generate certificate © Copyright IBM Corp. 2011 34 © Copyright IBM Corp. 2011 35 © Copyright IBM Corp. 2011 36 © Copyright IBM Corp. 2011 37 © Copyright IBM Corp. 2011 38 © Copyright IBM Corp. 2011 39 © Copyright IBM Corp. 2011 40 © Copyright IBM Corp. 2011 41 © Copyright IBM Corp. 2011 42 © Copyright IBM Corp. 2011 43 © Copyright IBM Corp. 2011 44 © Copyright IBM Corp. 2011 45 © Copyright IBM Corp. 2011 46 © Copyright IBM Corp. 2011 47 Creating certificate signing requests In the next few slides, let us look at a sample website to understand more about CSR, how they can be generated, and how to receive test certificate into key database. © Copyright IBM Corp. 2011 48 © Copyright IBM Corp. 2011 49 © Copyright IBM Corp. 2011 50 © Copyright IBM Corp. 2011 51 © Copyright IBM Corp. 2011 52 © Copyright IBM Corp. 2011 53 © Copyright IBM Corp. 2011 54 © Copyright IBM Corp. 2011 55 Certificate Files There are three main certificate files: • Trusted Root File (trusted.txt) - Contains the root certificates for the CAs trusted for this Sterling Connect:Direct Secure Plus node • Private Key File - Holds the encrypted private key corresponding to the public key in the CSR • Keycert File - Contains the encrypted certificate and private key The format of these files is PEM BER Base64 Encoded. PEM stands for Privacy Enhanced Mail. BER stands for Basic Encoding Rules. Base64 is a method for encoding binary data into ASCII format. © Copyright IBM Corp. 2011 56 Lesson Summary This lesson was designed to enable you to: • Describe the purpose of the Certificate Wizards • Generate a self signed certificate • Generate a certificate signing request • Send signing request to Thawte • Receive certificate from Thawte © Copyright IBM Corp. 2011 57 Module B: Introduction to Sterling Connect:Direct Secure Plus © Copyright IBM Corp. 2011 . Module B: Introduction to Sterling Connect:Direct Secure Plus This module includes the following lesson: • Lesson 3: Sterling Connect:Direct Secure Plus Overview © Copyright IBM Corp. 2011 59 Lesson 3: Sterling Connect:Direct Secure Plus Overview © Copyright IBM Corp. 2011 . Lesson Objectives This lesson has been designed to enable you to understand the: • History of Sterling Connect:Direct Secure Plus Option • Version 1 • Version 2 • Version 3 • Administration Tool - SPAdmin © Copyright IBM Corp. 2011 61 Overview Sterling Connect:Direct Secure Plus provides enhanced functions for Sterling Connect:Direct to help ensure the secure transfer of information among enterprises. • Authentication - Version 1 (V1) of the product uses the STS protocol. Version 2 (V2) uses the SSL handshake and Version 3 (V3) uses the TLS handshake. In Sterling Connect:Direct both nodes are authenticated. • Confidentiality - Sterling Connect:Direct uses encryption of control messages and encryption of data. • Message Integrity - Message digest of transmitted data. Non-repudiation is not included because the digital signatures that are generated do not stay with the data once it has been transmitted. In a sense, however, non-repudiation is provided for the data on the communications link itself. © Copyright IBM Corp. 2011 62 History of Sterling Connect:Direct Secure Plus The development of Sterling Connect:Direct Secure Plus was driven by customer need. It uses a “no frills” approach based on cryptography. The development of Version was based on STS protocol and not SSL for the following reasons: • Customer needed timely solution • Was still too soon for certificate-based security • Cryptography vendor had no SSL implementation at the time • RSA patent sill in effect. Royalties were a significant player in the decision. © Copyright IBM Corp. 2011 63 Security Functions The general security of Sterling Connect:Direct uses the following functions: • Userid/password authorization • Access control to Sterling Connect:Direct functions • Interface with OS security • Interface with other security mechanisms • Netmap Check • Secure Point of Entry • Firewall navigation © Copyright IBM Corp. 2011 64 The Sterling Connect:Direct Pyramid of Trust Digital signatures for data in transit Non-Repudiation Data Integrity Msg. digest / Dig. signatures Encryption Confidentiality Userid/password; C:D func. Auth. Security exits; FW nav. Access Control TLS, SSL, STS authentication; Netmap check Authentication © Copyright IBM Corp. 2011 65 Version 1 Version 1 was developed for Sterling Connect:Direct OS390, UNIX (AIX, HP-UX, Solaris), Windows NT, and OS/400. It utilizes the security consultant to advise and review information: • • • • • Based on Elliptic Curve public/private key cryptography Authentication through STS protocol Data confidentiality via symmetric key encryption Data integrity using digital signatures Administration tool - SPAdmin The encryption algorithms used are DES, TDES and IDEA. Key management for large numbers of nodes became an issue. Majority of customers are using SSL and TLS therefore Version 1 is not used as often as the other versions. © Copyright IBM Corp. 2011 66 Version 2 Version 2 was developed for Sterling Connect:Direct OS390, UNIX (AIX, HP-UX, Solaris), Windows. Implementation is reviewed by security consultants. It uses a SSL-based security. The administration tool SPAdmin was enhanced to support Version 2. A certificate Wizard was added for the creation of certificates. © Copyright IBM Corp. 2011 67 Version 3 V3 implements the TLS1.0 protocol. It has little external change to Sterling Connect:Direct Secure Plus. SSL and TLS protocols are similar but not interoperable. The Administration tool SPAdmin SSL Options include TLS. V3 uses the same Cipher Suites as SSL protocol. TLS has several improvements/enhancement that SSL: • Part of FIPS-140 certification • Better MAC algorithm • More granular alerts • Clearer definition of specifications “gray” areas © Copyright IBM Corp. 2011 68 Version 3.1 V3.1 Supports Advanced Encryption Standard (AES) 128 and 256 ciphers to provide broader platform security coverage and stronger data encryption algorithm options. These ciphers are only valid with the TLS protocol. Supports secure API Connections using the Sterling Connect:Direct Java Application Interface (API) Option. © Copyright IBM Corp. 2011 69 Administration Tool - SPAdmin The administration tool SA is responsible for: • Initializing the Sterling Connect:Direct Secure Plus Parmfile • Maintaining Local Node and Sterling Connect:Direct Secure Plus defaults • Maintaining (add/update/delete) Remote Sterling Connect:Direct Secure Plus nodes • Enabling/disabling Sterling Connect:Direct Secure Plus globally or by node © Copyright IBM Corp. 2011 70 SA Parmfile A Parmfile contains an encrypted record for each Sterling Connect:Direct node enabled for Sterling Connect:Direct Secure Plus, containing parameters such as protocol and cipher suites. The Access File contains the key to encrypt and decrypt Parmfile records. It is protected by using the OS security. SA initializes Parmfile on startup if parmfile does not exist. It prompts for passphrase used to create a key to encrypt Parmfile. • Specify trusted root file and key certificate file • Optionally populate from Netmap © Copyright IBM Corp. 2011 71 SA Local Node SA enables STS, SSL or TLS protocols. It is also responsible for enabling overrides. It sets SSL/TLS specific parameters: • Trusted root certificate file • Key certificate file • Client authentication • Cipher suites It also sets the STS parameters: • Public/private keys • Enable/disable encryption and message digests © Copyright IBM Corp. 2011 72 SA Remote Nodes The administration tool is also responsible for maintaining remote nodes. It can add, update or delete a node. © Copyright IBM Corp. 2011 73 Lesson Summary This lesson was designed to enable you to: • History of Sterling Connect:Direct Secure Plus Option • Version 1 • Version 2 • Version 3 • Administration Tool - SA © Copyright IBM Corp. 2011 74 Module C: Configuration For Microsoft Windows using SSL © Copyright IBM Corp. 2011 . Module C: Sterling Connect:Direct Secure Plus Configuration for Microsoft Windows This module includes the following lessons: • Lesson 4: Configuration Walkthrough for SSL © Copyright IBM Corp. 2011 76 Lesson 4: Installation and Configuration for Microsoft Windows © Copyright IBM Corp. 2011 . Lesson Objectives By the end of this lesson, you should be able to: • List the Sterling Connect:Direct Secure Plus for Windows Configuration Components • Configure Sterling Connect:Direct Secure Plus for Windows © Copyright IBM Corp. 2011 78 Parameters File Must contain a local node record • Authentication public key value • Digital signature public key value • Certificate Label & Path name Secure this data set* • To control User access Must contain remote node record for each node you want secure Connection with • Same name as Netmap adjacent node name • Authentication public key value* and digital signature public key value* • Certificate Label name* • Many values can be specific or default to local node record values © Copyright IBM Corp. 2011 79 How to Exchange Updated Keys with Trading Partners Automated update • Enable feature in parameter file Manual management* • Generate public key • Export to keyfile on Local node • Send exported keyfile to Remote node • Remote node imports keyfile © Copyright IBM Corp. 2011 80 How Often to Exchange Keys More frequent, the more secure Maintain a copy of the previous keys until both partners have updated parameter file © Copyright IBM Corp. 2011 81 Quick Start Pros Cons • One-stop method for building a parameter file that contains all know NETMAP records • All nodes have the same parameters • Updates may be required • Quick and easy • May contain some nodes you don’t want in the parameter file • Saves time • No manual entry for existing nodes © Copyright IBM Corp. 2011 • Some may be assigned alias name that are inappropriate 82 Exercise: © Copyright IBM Corp. 2011 83 Exercise: © Copyright IBM Corp. 2011 84 Exercise: © Copyright IBM Corp. 2011 85 Exercise: © Copyright IBM Corp. 2011 86 Exercise: © Copyright IBM Corp. 2011 87 Exercise: © Copyright IBM Corp. 2011 88 Exercise: © Copyright IBM Corp. 2011 89 Exercise: © Copyright IBM Corp. 2011 90 Exercise: © Copyright IBM Corp. 2011 91 Exercise: © Copyright IBM Corp. 2011 92 Exercise: © Copyright IBM Corp. 2011 93 Exercise: © Copyright IBM Corp. 2011 94 Exercise: © Copyright IBM Corp. 2011 95 Exercise: © Copyright IBM Corp. 2011 96 Exercise: © Copyright IBM Corp. 2011 97 Exercise: © Copyright IBM Corp. 2011 98 Exercise: © Copyright IBM Corp. 2011 99 Exercise: © Copyright IBM Corp. 2011 100 Exercise: © Copyright IBM Corp. 2011 101 Exercise: © Copyright IBM Corp. 2011 102 Exercise: © Copyright IBM Corp. 2011 103 Exercise: © Copyright IBM Corp. 2011 104 Exercise: © Copyright IBM Corp. 2011 105 Exercise: © Copyright IBM Corp. 2011 106 Exercise: © Copyright IBM Corp. 2011 107 Lesson Summary This lesson was designed to enable you to: • Walk through the configuration for SSL/TLS for Sterling Connect:Direct Secure Plus © Copyright IBM Corp. 2011 108 Module D: Secure Data Exchange and Troubleshooting © Copyright IBM Corp. 2011 . Module D: Secure Data Exchange and Troubleshooting This module includes the following lessons: • Lesson 5: Secure Data Exchange and Trouble Shooting © Copyright IBM Corp. 2011 110 Lesson 5: Secure Data Exchange and Troubleshooting © Copyright IBM Corp. 2011 . Lesson Objectives By the end of this lesson, you should be able to: • How Authentication works for SSL • Validate Sterling Connect:Direct Secure Plus configurations. • Process Submission/View Statistics • Modify Sterling Connect:Direct Secure Plus Options • Identify common errors and solutions. © Copyright IBM Corp. 2011 112 How Authentication Works for SSL © Copyright IBM Corp. 2011 113 Sending and Receiving Data for SSL Sending Customer Data After communication is authenticated, the PNODE begins transmitting data. Information for encrypting data is exchanged in the control blocks. If data compression is enabled, the PNODE compresses the data, based on settings defined in Sterling Connect:Direct. The PNODE encrypts the data with a cipher suite recognized by both communications nodes. Receiving Customer Data The SNODE receives the data. The SNODE decrypts the data using a cipher suite available for both the PNODE and the SNODE. If the data is compressed, the receiving node decompresses it. . © Copyright IBM Corp. 2011 114 Validating Sterling Connect:Direct Secure Plus Configuration Every Sterling Connect:Direct Secure Plus node must be defined in the Secure Plus Parmfile if: • Secure Plus is enabled in the Local Node record • Or overrides are enabled in the Local Node record Sterling Connect:Direct Secure Plus may be enabled or disabled by individual node. Both nodes. must be configured with the same protocol or the Connection will fail. • There is no negotiation of Sterling Connect:Direct Secure Plus protocols. © Copyright IBM Corp. 2011 115 Process Submission V1 Copy overrides • overrides Parmfile encryption setting • overrides Parmfile signature setting V2 and V3 have no copy overrides step1copy from (file=/usr1/data/readme.txt) secure=(encrypt.data=y,signature=y) to (file=/usr2/data/readme2.txt disp=(rpl)) © Copyright IBM Corp. 2011 116 View Statistics for SSL © Copyright IBM Corp. 2011 117 Modifying Sterling Connect:Direct Secure Plus Option You can modify a Sterling Connect:Direct Secure Plus Option configuration. The following actions are available for modifying the Option information: Disabling Sterling Connect:Direct Secure Plus Option Creating a remote node record Deleting a Sterling Connect:Direct Secure Plus Option remote node record Changing the cipher suites for an SSL configured node Changing the encryption algorithm names © Copyright IBM Corp. 2011 118 Common Errors and Solutions Troubleshooting with Sterling Connect:Direct Secure Plus most often entails configuration issues. Traces display decrypted control blocks by not decrypted user data Please see the Sterling Connect:Direct Secure Plus Implementation Guide for a full list of common errors and solutions. © Copyright IBM Corp. 2011 119 Lesson Summary This lesson was designed to enable you to: • How Authentication works for SSL • Validate Sterling Connect:Direct Secure Plus configurations. • Process Submission • Modify Sterling Connect:Direct Secure Plus Option • Identify and correct common errors. • Validate Sterling Connect:Direct Secure Plus configurations. • Identify common errors and solutions. © Copyright IBM Corp. 2011 120 Course Wrap Up © Copyright IBM Corp. 2011 . Congratulations! You have completed the Sterling Connect:Direct Secure Plus for Windows course Are there any Questions? © Copyright IBM Corp. 2011 122