Keyboard Shortcuts
Likes
Search
Protecting telnet 3270 sessions
开云体育Hi Michael,It would be really nice if you could share your stunnel4 setup with us here. It is an oft overlooked fact that running tn3270 sessions over the internet is not a prime example of good data security - I ran a Wireshark on my own network recently and saw the VM passwords pass by - and maybe more people can safeguard their sessions if pointed in the right way. Best regards, 搁别苍é. ?
|
Hello!
toggle quoted message
Show quoted text
I don't know about Michael, but when I ran a regular setup with Hercules running VM/370 on it, I would use SSH to connect to the system. I was able to do so from an office in the City to here, and the networking software I had running, other than the TCP/IP stack reported just the regular things, and included notations that the connection was done in secure format. However a certain fellow will need to have a something else translate this message. ----- Gregg C Levine gregg.drwho8@... "This signature fought the Time Wars, time and again." On Thu, Mar 10, 2022 at 8:05 AM rvjansen@... <rvjansen@...> wrote:
|
Dear René, dear Gregg, of course I will share my setup with the community asap. Just give me some time to prep things. For using stunnel4, one needs X.509 certificates which can be easily produced with "easy RSA". But more on this later.? @Gregg: A ssh tunnel is a viable option, however, it needs a user identy / account on the server side. If you don't want users of the mainframe system to be users of the hosting linux / unix / whatever system, I reckon that stunnel is the easier way.? |
开云体育Michael, VM/370 knows nothing about TN3270 or IP. All it sees is a local 3270 session. If you wanted a secure session into VM you would actually need to update Hercules. Can someone tell me why you would encrypt 3270 coms into a legacy Hercules instance? What is some one going to learn from snooping on the traffic? ?A password for a 50 year old OS running in an isolated environment? Dave ? ? From: [email protected] <[email protected]> On Behalf Of Michael Grom
Sent: 11 March 2022 07:28 To: [email protected] Subject: Re: [h390-vm] Protecting telnet 3270 sessions ? Dear René, dear Gregg, of course I will share my setup with the community asap. Just give me some time to prep things. For using stunnel4, one needs X.509 certificates which can be easily produced with "easy RSA". But more on this later.? @Gregg: A ssh tunnel is a viable option, however, it needs a user identy / account on the server side. If you don't want users of the mainframe system to be users of the hosting linux / unix / whatever system, I reckon that stunnel is the easier way.? |
Hi Dave, simply, I don't want uninvited visitors in any of my systems, be them actual or vintage. In my own network at home, behind router and firewall, unencrypted comms or terminal sessions is not much of an issue. As soon as your server is in the internet (cloud offering, virtual server) or accessible through the internet, that's a different story. We also cannot rule out that the vintage OS together with hercules can be a vector to attack the underlying host. So yes, speaking of data protection, the system(s) I run is only a big playground. No personal or business data.? a) the host system is guarded with a proper IPTABLES setup, only allowing for the desired TLS and/or SSH destination ports (and source ports, if establishing a link to another computer) Macintosh (the machine where x3270 4.x fails to establish a ssl connection for some odd reason, instead, x3270 talks to a stunnel acting as a client to the server) /opt/homebrew/etc/stunnel/stunnel.conf output = /opt/homebrew/var/log/stunnel.log [x3270] cert = /opt/homebrew/etc/stunneL/kontor2.crt key? = /opt/homebrew/etc/stunnel/kontor.key CAfile = /opt/homebrew/etc/stunnel/chain.pem client = yes accept = 127.0.0.1:43270 connect = vmd33672.contaboserver.net:43270 [x3271] cert = /opt/homebrew/etc/stunneL/kontor2.crt key? = /opt/homebrew/etc/stunnel/kontor.key CAfile = /opt/homebrew/etc/stunnel/chain.pem client = yes accept = 127.0.0.1:53270 ? connect = vmd33672.contaboserver.net:53270 ? output = /var/log/stunnel4/stunnel.log [x3271] accept = 53270 connect= 3271 verifyChain=yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem CAfile = /etc/stunnel/chain2.pem
[x3270] accept = 43270 connect= 3270 verifyChain = yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem ? CAfile = /etc/stunnel/chain2.pem [herchttp] accept = 4888 connect= 8088 verifyChain = yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem CAfile = /etc/stunnel/chain2.pem ? [herchttp-2] accept = 5888 connect= 8082 verifyChain = yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem CAfile = /etc/stunnel/chain2.pem
? #!/bin/bash ? x3270 -model 3279-2 -accepthostname vmd33672.contaboserver.net -cafile ~/chain.pem? -certfile ~/kontor2.crt -keyfile ~/kontor.key? L:vmd33672.contaboserver.net:43270 ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:43270 ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:53270 ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:4888 ? ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:5888 ? |
开云体育Michael, So you mean you also use it for authentication. Why not just say that? Its fine. Personally I would just create a Linux VM for isolation… Dave ? From: [email protected] <[email protected]> On Behalf Of Michael Grom
Sent: 11 March 2022 11:57 To: [email protected] Subject: Re: [h390-vm] Protecting telnet 3270 sessions ? Hi Dave, simply, I don't want uninvited visitors in any of my systems, be them actual or vintage. In my own network at home, behind router and firewall, unencrypted comms or terminal sessions is not much of an issue. As soon as your server is in the internet (cloud offering, virtual server) or accessible through the internet, that's a different story. We also cannot rule out that the vintage OS together with hercules can be a vector to attack the underlying host. So yes, speaking of data protection, the system(s) I run is only a big playground. No personal or business data.? a) the host system is guarded with a proper IPTABLES setup, only allowing for the desired TLS and/or SSH destination ports (and source ports, if establishing a link to another computer) Macintosh (the machine where x3270 4.x fails to establish a ssl connection for some odd reason, instead, x3270 talks to a stunnel acting as a client to the server) /opt/homebrew/etc/stunnel/stunnel.conf output = /opt/homebrew/var/log/stunnel.log [x3270] cert = /opt/homebrew/etc/stunneL/kontor2.crt key? = /opt/homebrew/etc/stunnel/kontor.key CAfile = /opt/homebrew/etc/stunnel/chain.pem client = yes accept = 127.0.0.1:43270 connect = vmd33672.contaboserver.net:43270 [x3271] cert = /opt/homebrew/etc/stunneL/kontor2.crt key? = /opt/homebrew/etc/stunnel/kontor.key CAfile = /opt/homebrew/etc/stunnel/chain.pem client = yes accept = 127.0.0.1:53270 ? connect = vmd33672.contaboserver.net:53270 ? output = /var/log/stunnel4/stunnel.log [x3271] accept = 53270 connect= 3271 verifyChain=yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem CAfile = /etc/stunnel/chain2.pem
[x3270] accept = 43270 connect= 3270 verifyChain = yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem ? CAfile = /etc/stunnel/chain2.pem [herchttp] accept = 4888 connect= 8088 verifyChain = yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem CAfile = /etc/stunnel/chain2.pem ? [herchttp-2] accept = 5888 connect= 8082 verifyChain = yes verifyPeer = no cert = /etc/stunnel/vmd33672-server.pem CAfile = /etc/stunnel/chain2.pem
? #!/bin/bash ? x3270 -model 3279-2 -accepthostname vmd33672.contaboserver.net -cafile ~/chain.pem? -certfile ~/kontor2.crt -keyfile ~/kontor.key? L:vmd33672.contaboserver.net:43270 ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:43270 ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:53270 ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:4888 ? ACCEPT ? ? tcp? --? anywhere ? ? ? ? ? ? anywhere ? ? ? ? ? ? tcp dpt:5888 ? |