Reputation: 1322
Linux Server Box running WebSphere MQ Server v7.1:
I have created a user 'mq-user' that belongs to 'mq-users' group in Linux. Then I created a queue manager QM_TEST
, and used MQSC to issue the following commands to create a queue and set up the security:
SET AUTHREC OBJTYPE(QMGR) PRINCIPAL('mq-user') AUTHADD(ALL)
SET AUTHREC PROFILE(SYSTEM.MQEXPLORER.REPLY.MODEL) OBJTYPE(QUEUE) PRINCIPAL('mq-user') AUTHADD(INQ,DSP,GET)
SET SET AUTHREC PROFILE(SYSTEM.ADMIN.COMMAND.QUEUE) OBJTYPE(QUEUE) PRINCIPAL('mq-user') AUTHADD(INQ,DSP,PUT)
DEFINE CHANNEL (TEST_CHANNEL) CHLTYPE (SVRCONN) TRPTYPE (TCP) MCAUSER('mq-user')
SET CHLAUTH(TEST_CHANNEL) TYPE(ADDRESSMAP) ADDRESS(*) MCAUSER('mq-user')
DEFINE QLOCAL (TEST_QUEUE)
SET AUTHREC PROFILE(TEST_QUEUE) OBJTYPE(QUEUE) PRINCIPAL('mq-user') AUTHADD(ALL)
DEFINE LISTENER (TEST_LISTENER) TRPTYPE (TCP) CONTROL (QMGR) PORT (1414)
START LISTENER (TEST_LISTENER)
Linux Client Box running WebSphere MQ Client v7.1 and WebSphere MQ Explorer:
I am logged in as my username (arrehman) which is not part of mq-users group. However I am able to access the queue I created above both via a Java Application and via MQ Explorer client without passing any user credentials. Why is it this way if security is in effect?
Any further details needed, please let me know. Thanks.
Upvotes: 2
Views: 5087
Reputation: 31832
This line:
SET CHLAUTH(TEST_CHANNEL) TYPE(ADDRESSMAP) ADDRESS(*) MCAUSER('mq-user')
Says the following:
TEST_CHANNEL
...mq-user
In other words, enable the channel such that any connections inherit the privileges of mq-user
regardless of where they originate and what identity they present. So the behavior you are seeing is the expected behavior based on the CHLAUTH
rule above.
There are a few other problems with the rules as listed:
PRINCIPAL
rather than GROUP
. On non-windows servers if you specify PRINCIPAL
what happens is that the QMgr looks up that ID, queries its primary group and then sets authorizations based on that. So if mq-users
has a primary group of staff
or users
that that is what gets authorized instead of mq-users
and is probably not what you intended. Always use group
so that you get the result you intend with setmqaut
or AUTHREC
.ALL
on the QMgr makes the ID/group administrative. One of the privileges at the QMgr level is SET
and any user in a group with SET
rights can set, among other things, authorization control lists. So even though you only granted AUTHADD(INQ,DSP,PUT)
the mq-users
ID can submit PCF commands to grant all access to all objects. Only grant CONNECT
and INQUIRE
on the QMgr if that's all you need. USERSRC(CHANNEL)
on the mapping, then your ID would have been used and most likely rejected. But the rejection would have been either because it is in the mqm
group (which is blocked by a default CHLAUTH
rule) or because there are no AUTHREC
records for the group it is in.For more about hardening WMQ, there are a number of resources collected here. The Hardening WebSphere MQ presentation is from v7.0. Although v7.1 has new controls, the principals remain the same:
MCAUSER
value by hard-coding it in the channel or by using an exit or CHLAUTH
rule to dynamically set itUpvotes: 7