Here are the detailed configuration steps for securing Telnet with Secure Sockets Layer (SSL).
In releases before V5R1, port restrictions were used because Secure Sockets Layer (SSL) support was not available for Telnet. Now you can specify whether SSL, non-SSL, or both are to start. Therefore, there is no longer a need for port restrictions. If you have defined port restrictions in previous releases, you need to remove the port restrictions in order to use the SSL parameter.
To determine whether you have Telnet port restrictions and remove them so that you can configure the Telnet server to use SSL, follow these steps:
By default, the setting is to start SSL sessions on port 992 and non-SSL sessions on port 23. The Telnet server uses the service table entry for Telnet to get the non-SSL port and Telnet-SSL to get the SSL port.
To use Digital Certificate Manager (DCM) to create and operate a local certificate authority (CA) on the system, follow these steps:
Be sure to select the application ID for the Telnet server (QIBM_QTV_TELNET_SERVER).
Although this scenario does not use object signing certificates, be sure to complete this step. If you cancel at this point in the task, the task ends and you need to perform separate tasks to complete your SSL certificate configuration.
Be sure to select the application ID for the Telnet server (QIBM_QTV_TELNET_SERVER).
After you have completed the forms for this guided task, you can configure the Telnet Server to require client authentication.
To activate this support, the system administrator indicates how SSL support is handled. Use the Telnet Properties General panel in iSeries Navigator to indicate whether SSL, non-SSL, or support for both will start when the Telnet server starts. By default, the SSL and non-SSL support always starts.
The System Administrator has the ability to indicate whether the system requires SSL client authentication for all Telnet sessions. When SSL is active and the system requires client authentication, the presence of a valid client certificate means that the client is trusted.
To configure the Telnet server to require certificates for client authentication, follow these steps:
Now that you have configured the Telnet server to require certificates for client authentication, you can enable and start SSL for the Telnet server.
To enable SSL on the Telnet server, follow these steps:
Select this to allow only SSL sessions with the Telnet server.
Select this to an SSL port will not connect.
Allows both secure and non-secure sessions with the Telnet server.
To start the Telnet server using iSeries Navigator, follow these steps:
To participate in an SSL session, the Telnet client must be able to recognize and accept the certificate that the Telnet server presents to establish the SSL session. To authenticate the server's certificate, the Telnet client must have a copy of the CA certificate in the i5/OS® key database. When the Telnet server uses a certificate from a local CA, the Telnet client must obtain a copy of the local CA certificate and install it in the i5/OS key database.
To add a local CA certificate from the system so that the Telnet client can participate in SSL sessions with Telnet servers that use a certificate from the Local CA, follow these steps:
This tab does not appear unless you have completed a selective install of iSeries Client Encryption (128-bit), 5722-CE3.
The download button automatically updates the IBM Toolbox for Java™ PC key database.
You have configured SSL for the Telnet server, specified that the server should trust certificates that the present CA issues, and specified that it require certificates for client authentication. Now, users must present a valid and trusted client certificate to the Telnet server for each connection attempt.
Clients need to use the local CA to obtain a certificate for authentication to the Telnet server and import that certificate to the IBM Key Management database before client authentication works.
First, clients must use DCM to obtain a user certificate by following these steps:
Microsoft® Internet Explorer 5 or Netscape 4.5 are required to use the export and import functions.
Next, import the certificate to the IBM Key Management database so that the Telnet client can use it for authenticating the certificate to the IBM key by following these steps:
You must add the import client that creates the client certificate to the PC key database; otherwise, the import operation of the client certificate does not work.
With these steps complete, the Telnet server can establish an SSL session with the Telnet client and the server can authenticate the user to resources based on the certificate that the client presents.