The information in this article applies to:
SYMPTOMSSingle sign-on can be manipulated to disclose the password on an SSCP-LU session. CAUSE
The 3270 single sign-on feature relies on keyword substitution in the data
stream and is not completely secure. This optional feature should not be
deployed in environments requiring the maximum achievable security because
there is no way to guarantee that the host screen to which the keyword is
directed will not echo back the clear text password to the user as though
it were ordinary data.
However, if you press the PA1 key to get into SSCP-LU mode, then type MS$SAMEP on the SSCP session, SNA Server will replace the keyword, no matter how many messages have gone before on the session. Normally, SNA Server is counting the number of RUs since a Bind, and refuses to substitute the keyword with an actual password if more than a particular number RUs have gone by. For most hosts, this covers the logon sequence. The usual user experience is this:
RESOLUTIONMicrosoft has confirmed this to be a problem in SNA Server versions 4.0 and 4.0 Service Pack 1. This problem was corrected in the latest SNA Server version 4.0 U.S. Service Pack. For information on obtaining this Service Pack, query on the following word in the Microsoft Knowledge Base (without the spaces): S E R V P A C K MORE INFORMATION
The update for this issue insures that SNA Server does not perform password
keyword substitution for longer than 30 seconds (default) from the start of
each LU session. This is ample time for an automated script to log on to
most host applications. However, this should not be regarded as a complete
solution to the security problem.
Additional query words:
Keywords : |
Last Reviewed: September 21, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |