I've had several customers run web apps for customers and their in-house
apps on a single partition server. These are small companies with no tech
staff, no network admin, and basically "lights out" systems-no one monitors
except me. In 10 years none has been taken down or infiltrated (that we can
detect). One has had multiple hacks of Win stuff, spammers taking over
Exchange, etc, but that network was reworked & firewalled.
All web, ftp traffic is tunnelled to the i, and firewall is set to not allow
anything originating from the outside except email tunnelled to a Exchange
server.
The i takes many script attacks every day-all end up in the Apache error
log. The scripts are win, unix, php stuff.
The apps do not take credit cards-we would not pass a PCI audit.
Customers (with signed contracts) log on to a RPGLE/cgi app & place & review
orders, run reports, reprint stmts, sign up for events, etc. They are not
using OS400 security.
Briefly:
Remote access direct to the network or i is by vpn only with strong keys, .
No ftp to the i except from specific ip(exit pgms). Never remote telnet. No
remote pc (pc-anywhere) allowed in the network. Many of the recommendations
of the old redbook Protecting Your AS400 from Harm on the Internet were
implemented. system is at Security level 50. Audit journal on & monitored.
Every once in a while I turn on a comm trace - nothing yet. No easy profiles
on system, & chg pwd every 30 days, hard pwd rules. All tcp servers not used
turned off. No guest profiles for anything. Strong antivirus, spyware
detection on network. Web app accepts nothing direct into sql (sql
injection) without editing. Web app access a single lib & single main folder
in IFS and it is locked down. There is nothing fancy in web app, it's html4,
almost no javascript or ajax. Reasonably up to date with ptfs and the new
security group, tcp group, http, database, etc.
I am bluntly honest with the owners about their risk. They are ok with that.
This is not for financial institutions, high profile companies, government
or education, or anyone with a budget to provide a better infrastructure.
Read the redbook Configure Your System For Common Criteria Security, and
Experts Guide to OS/400 & i5/OS Security by Woodbury & Botz, also Hacking
iSeries by Carmel, and an older book - Know Your Enemy (The Honeynet
Project) an interesting view of who hackers are...probably out of date but
it's a start.
Certainly with all the reading material, I have not implemented many things,
but where I can I do.
I fear keyboard loggers on pc's more than web hackers..
Jim Franz
----- Original Message -----
From: <elehti@xxxxxxxxxxxxxxxxxx>
To: <web400@xxxxxxxxxxxx>
Sent: Friday, August 14, 2009 3:39 PM
Subject: [WEB400] protecting your public-facing,web-enabled IBM i from
hackers
My question to all of you who have public-facing, web-enabled IBM I
machines running your core applications.
How do you secure this machine against possible hacking attempts from
outsiders?
If your website has web apps like self-service for your customers and
suppliers, allowing people to view/change data that resides on your
system, how do you protect your machine?
Or do you keep your system off the internet, and web-enable a secondary
file-server machine instead?
I am aware that thousands of banks and credit unions running their
[censored] core banking applications on the IBM I use a "middleware web
server" that acts as a conduit between the bank customer web page and
the System I, thus enabling banking customers to transact their banking
business without needing a different IBM user profile for each bank
customer. The RPGIV programs running on the System I send and receive
customer-specific information via data queues out to the middleware web
server.
--
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.
As an Amazon Associate we earn from qualifying purchases.