<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>DeepQueue – Store and Forward</title>
	<atom:link href="http://t-rob.net/category/podcast/deepqueue/feed/" rel="self" type="application/rss+xml"/>
	<link>https://t-rob.net</link>
	<description>A blog about securing and using IBM MQ</description>
	<lastBuildDate>Fri, 27 Nov 2009 05:14:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">35216262</site>	<itunes:explicit>no</itunes:explicit><copyright>Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License</copyright><itunes:image href="http://t-rob.net/images/DQLogo.png"/><itunes:keywords>wmq,mq,security,middleware,news,IBM,messaging,SOA,bestpractices</itunes:keywords><itunes:summary>Discussion and news about WebSphere MQ security.</itunes:summary><itunes:subtitle>Discussion and news about WebSphere MQ security.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Podcasting"/></itunes:category><itunes:author>T.Rob Wyatt</itunes:author><itunes:owner><itunes:email>dq@t-rob.net</itunes:email><itunes:name>T.Rob Wyatt</itunes:name></itunes:owner><item>
		<title>Deep Queue #14 – The Elephant Under the Bed</title>
		<link>https://t-rob.net/2009/11/27/deep-queue-14-the-elephant-under-the-bed/</link>
					<comments>https://t-rob.net/2009/11/27/deep-queue-14-the-elephant-under-the-bed/#comments</comments>
		
		
		<pubDate>Fri, 27 Nov 2009 05:14:27 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=354</guid>

					<description><![CDATA[This episode of The Deep Queue celebrates the first birthday of the podcast with some discussion of the SSL protocol vulnerability that was recently discovered.  Although there has been no announcement with regard to WebSphere MQ, I try to put &#8230; <a href="https://t-rob.net/2009/11/27/deep-queue-14-the-elephant-under-the-bed/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>This episode of The Deep Queue celebrates the first birthday of the podcast with some discussion of the SSL protocol vulnerability that was recently discovered.  Although there has been no announcement with regard to WebSphere MQ, I try to put the whole discussion into a larger context and ask if this is really the thing we need to worry about considering what else is going on.  More on that in the podcast or transcript.</p>
<p><span id="more-354"></span></p>
<p><!-- 		@page { size: 8.5in 11in; margin: 0.79in } 		P { margin-bottom: 0.08in } -->Links for this episode:</p>
<p>IBM e-notifications service<br />
<a title="IBM e-notification service" href="http://www-01.ibm.com/software/websphere/support/einfo.html" target="_blank">http://www-01.ibm.com/software/websphere/support/einfo.html</a></p>
<p>Security Now podcast: <a href="http://bit.ly/2sLizB" target="_blank">http://bit.ly/2sLizB</a> <a href="http://www.grc.com/securitynow.htm"><br />
</a>The episode you want is #223 and it should be online this Thursday, November 19th.</p>
<p>Presentation: <em>New Tricks For Defeating SSL In Practice</em> <a href="http://bit.ly/NPtwf" target="_blank">http://bit.ly/NPtwf</a><br />
from Black Hat 2009 by Moxie Marlinspike</p>
<p>Tools: SSLSTRIP from thoughtcrime.org <a href="http://bit.ly/3mu8QB">http://bit.ly/3mu8QB</a><br />
Provided by Moxie Marlinspike</p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/11/27/deep-queue-14-the-elephant-under-the-bed/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">354</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator><enclosure length="2454363" type="application/pdf" url="http://bit.ly/NPtwf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>This episode of The Deep Queue celebrates the first birthday of the podcast with some discussion of the SSL protocol vulnerability that was recently discovered.  Although there has been no announcement with regard to WebSphere MQ, I try to put &amp;#8230; Continue reading &amp;#8594;</itunes:subtitle><itunes:author>T.Rob Wyatt</itunes:author><itunes:summary>This episode of The Deep Queue celebrates the first birthday of the podcast with some discussion of the SSL protocol vulnerability that was recently discovered.  Although there has been no announcement with regard to WebSphere MQ, I try to put &amp;#8230; Continue reading &amp;#8594;</itunes:summary><itunes:keywords>wmq,mq,security,middleware,news,IBM,messaging,SOA,bestpractices</itunes:keywords></item>
		<item>
		<title>Deep Queue #13: Unlucky number thirteen</title>
		<link>https://t-rob.net/2009/08/28/deep-queue-13-unlucky-number-thirteen/</link>
					<comments>https://t-rob.net/2009/08/28/deep-queue-13-unlucky-number-thirteen/#respond</comments>
		
		
		<pubDate>Fri, 28 Aug 2009 17:19:10 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=341</guid>

					<description><![CDATA[After a month unplanned hiatus, The Deep Queue is back.  This month we are talking about high availability, which is obviously something The Deep Queue lacks.  This may not seem like a security topic at first glance but to my &#8230; <a href="https://t-rob.net/2009/08/28/deep-queue-13-unlucky-number-thirteen/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>After a month unplanned hiatus, The Deep Queue is back.  This month we are talking about high availability, which is obviously something The Deep Queue lacks.  This may not seem like a security topic at first glance but to my way of thinking it is.  There is no perfect security so, no matter how much you invest in protection, it&#8217;s a good idea to assume there will be a breach at some point.  When that happens you need to detect it and recover from it.  For that reason, whenever I perform a security assessment, monitoring and recovery are considered.   The first segment talks about planning for recovery from an adverse security event.</p>
<p>The second segment is all about the new v7.0.1 of WebSphere MQ!  Yes, the long awaited refresh pack is released and you can download it now.  In addition, the product manuals are all updated with the new features.  The v7.0 release was massive and it seems hard to believe it would be followed so quickly by another release with this much functionality but the folks in Hursley apparently don&#8217;t sleep.  There&#8217;s lots of detail in the podcast and at the links below.</p>
<p><span id="more-341"></span></p>
<p><!-- 		@page { size: 8.5in 11in; margin: 0.79in } 		P { margin-bottom: 0.08in } --><strong>Links for this episode:</strong></p>
<p>IBM WebSphere MQ V7.0 is enhanced with increased availability, security, and governance<br />
IBM United States Software Announcement 209-245<br />
August 25, 2009<br />
<a href="http://bit.ly/1anQmy">http://bit.ly/1anQmy</a></p>
<p align="LEFT">
<p align="LEFT">IBM WebSphere MQ for z/OS V7.0.1 delivers storage and memory improvements and increased availability for queue-sharing groups<br />
IBM United States Software Announcement 209-248<br />
August 25, 2009<br />
<a href="http://bit.ly/3bv4pv">http://bit.ly/3bv4pv</a>
</p>
<p align="LEFT">
<p align="LEFT">developerWorks: Mission:Messaging: Planning for SSL on the WebSphere MQ network<br />
<a href="http://bit.ly/3loir">http://bit.ly/3loir</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/08/28/deep-queue-13-unlucky-number-thirteen/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">341</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>WebSphere MQ – Coming soon to an audit near you!</title>
		<link>https://t-rob.net/2009/07/04/websphere-mq-%e2%80%93-coming-soon-to-an-audit-near-you/</link>
					<comments>https://t-rob.net/2009/07/04/websphere-mq-%e2%80%93-coming-soon-to-an-audit-near-you/#respond</comments>
		
		
		<pubDate>Sat, 04 Jul 2009 15:34:52 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[Admin]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[commentary]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<category><![CDATA[WMQ]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=326</guid>

					<description><![CDATA[The June 29 episode of The Deep Queue is finally up!  Sorry about the delay, I was on an engagement last week that had me staying over the weekend in Boston to perform a production implementation on Saturday.  Although I&#8217;ve &#8230; <a href="https://t-rob.net/2009/07/04/websphere-mq-%e2%80%93-coming-soon-to-an-audit-near-you/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>The June 29 episode of <em>The Deep Queue</em> is finally up!  Sorry about the delay, I was on an engagement last week that had me staying over the weekend in Boston to perform a production implementation on Saturday.  Although I&#8217;ve got a great recording setup at home, I&#8217;m afraid I don&#8217;t have decent equipment to do the podcast on the road.  Instead, I flew my wife up to Boston and we spent Sunday at the aquarium and then went to see Blue Man Group.</p>
<p>The week delay worked out great though, because last week a friend contacted me to tell me his shop needs to remediate for PCI compliance.  He has a hundred days to create a segmented MQ network within which to isolate his PCI applications.  The time limit is due to having found out about the problems in the course of an audit rather than through independent research or assessment.  Since this is likely to be a growing problem, it turned out to be my topic for this month&#8217;s episode.</p>
<p><span id="more-326"></span>The reason I think this will be a growing problem is that I am among the folks talking with the assessment community about WMQ security, the implementation gaps that are commonly seen and  methods for assessment and remediation that are currently available.   Hopefully, the participation of the assessment community will result in refining these existing tools and creating best practices for securing MQ in a regulatory compliance context such as PCI.</p>
<p>I&#8217;m also excited to be working with some old friends at Evans Resource Group.  ERG is building a business around helping assessors get up to speed with WebSphere MQ.  They are creating a curriculum and tools and are already working with some of their first clients in this space.  Many of the folks at ERG are Reconda alums who I worked with to develop AppWatch so I&#8217;m confident they will do a great job.  I&#8217;ll be working with them next week to help them develop and fine-tune their content and get the reactions of those initial clients.</p>
<p>Lots more about all this in the podcast so please download it or the transcript and let me know your thoughts.</p>
<p>Also, don&#8217;t forget to sign up for the webinar I&#8217;m giving July 10th at noon Eastern, entitled <a title="Register for the webinar" href="https://www2.gotomeeting.com/register/848961386" target="_blank"><em>What You Don&#8217;t Know About Middleware Vulnerabilities Will Hurt You</em></a>.  The webinar is structured for assessors and  QSAs and includes my 5-Minute WebSphere MQ Assessment.</p>
<p>Links from the podcast:</p>
<p><!-- 		@page { size: 8.5in 11in; margin: 0.79in } 		P { margin-bottom: 0.08in } -->PCIKnowledgebase.com: <a href="http://pciknowledgebase.com/">http://PCIKnowledgebase.com</a></p>
<p>Webinar:  <em>What You Don&#8217;t Know About Middleware Vulnerabilities Will Hurt You<br />
</em><a href="https://www2.gotomeeting.com/register/848961386"><em>https://www2.gotomeeting.com/register/848961386</em></a></p>
<p>Evans Resource Group home page: <a href="http://www.evansresourcegroup.com/">http://www.evansresourcegroup.com</a></p>
<p>Evans Resource group free MQ security check:<br />
<a href="http://www.evansresourcegroup.com/technologies-6b.html">http://www.evansresourcegroup.com/technologies-6b.html</a></p>
<p>Prolifics home page: <a href="http://www.prolifics.com/">http://www.prolifics.com</a></p>
<p>Prolifics free MQ Health and Security Check:<br />
<a href="http://www.prolifics.com/Collateral/Documents/English-US/service-brochures/Prolifics_WebSphereMQ_HealthSecurityCheck.pdf">http://www.prolifics.com/Collateral/Documents/English-US/service-brochures/Prolifics_WebSphereMQ_HealthSecurityCheck.pdf</a></p>
<p>Capitalware homepage: <a href="http://www.capitalware.biz/">http://www.capitalware.biz</a></p>
<p>Capitalware consulting services: <a href="http://www.capitalware.biz/services.html">http://www.capitalware.biz/services.html</a></p>
<p>Primeur homepage: <a href="http://www.primeur.com/">http://www.primeur.com</a></p>
<p>Primeur Data Secure for WebSphere MQ:<br />
<a href="http://www.primeur.com/products/data_security/spazio_data_secure.html#dswmq">http://www.primeur.com/products/data_security/spazio_data_secure.html#dswmq</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/07/04/websphere-mq-%e2%80%93-coming-soon-to-an-audit-near-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">326</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>Deep Queue #11: Security breaches are not news?</title>
		<link>https://t-rob.net/2009/05/25/deep-queue-11-security-breaches-are-not-news/</link>
					<comments>https://t-rob.net/2009/05/25/deep-queue-11-security-breaches-are-not-news/#respond</comments>
		
		
		<pubDate>Mon, 25 May 2009 15:44:08 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<category><![CDATA[WebSphere MQ Security]]></category>
		<category><![CDATA[WMQ]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=318</guid>

					<description><![CDATA[The subject of the UC Berkeley data breach was discussed on the May 15th Security Squad podcast.  The thing that struck me was that the breach itself was not the topic of conversation but rather the debate was about whether &#8230; <a href="https://t-rob.net/2009/05/25/deep-queue-11-security-breaches-are-not-news/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>The subject of the UC Berkeley data breach was discussed on the May 15th Security Squad podcast.  The thing that struck me was that the breach itself was not the topic of conversation but rather the debate was about whether the breach was in fact newsworthy.  If you are not familiar with it, 160,000 Social Security numbers and medical information were stolen in the UC Berkeley data breach.  This notion that breaches of the &#8220;trusted&#8221; internal network are so common that&#8217;s possible to discuss with a straight face whether a breach of this magnitude is newsworthy is itself worthy of some discussion.</p>
<p>In this episode of The Deep Queue, I tackle this topic as well as the idea of software &#8220;never events&#8221;.  The term was coined in the medical professions to refer to preventable events with serious or deadly consequences.  The kind of events that should never happen such as operating on the wrong body part or wrong person.  the National Quality Foundation has developed a list of 28 such events which are used to report and track quality of care across the nation.  Bob Charette guested on the CERT Security podcast to campaign for a similar set of events in the software industry.  In this episode of The Deep Queue, I propose my own list of WebSphere MQ never events.</p>
<p><span id="more-318"></span><strong>Links for this episode:</strong></p>
<p>University of California Berkeley Data Breach<br />
<a href="http://datatheft.berkeley.edu/news.shtml" target="_blank">http://datatheft.berkeley.edu/news.shtml</a><br />
Security Squad, SearchSecurity.com podcast for May 15, 2009<br />
<a href="http://itknowledgeexchange.techtarget.com/security-wire-weekly/squad-data-breach-burn-out/" target="_blank">http://itknowledgeexchange.techtarget.com/security-wire-weekly/squad-data-breach-burn-out/</a></p>
<p>PrivacyRights.org Chronology of Data Breaches<br />
<a href="http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP" target="_blank">http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP</a></p>
<p>BankInfoSecurity.com – List of banks reported to have been affected by the Heartland breach tops 600<br />
<a href="http://www.bankinfosecurity.com/articles.php?art_id=1200" target="_blank">http://www.bankinfosecurity.com/articles.php?art_id=1200</a></p>
<p>National Quality Forum – Serious Reportable Events (a.k.a. “Never Events”)<br />
<a href="http://www.qualityforum.org/projects/completed/sre/fact-sheet.asp" target="_blank">http://www.qualityforum.org/projects/completed/sre/fact-sheet.asp</a></p>
<p>CERT Security podcast series for May 5, 2009<br />
<a href="http://www.cert.org/podcast/" target="_blank">http://www.cert.org/podcast/</a></p>
<p>WebSphere MQ Security Heats Up – Blog post with downloadable setmqaut scripts to secure administrative access to WebSphere MQ.<br />
<a href="http://t-rob.net/2008/07/08/websphere-mq-security-heats-up/" target="_blank">http://t-rob.net/2008/07/08/websphere-mq-security-heats-up/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/05/25/deep-queue-11-security-breaches-are-not-news/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">318</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>The Deep Queue – Episode #10: Cash in on mortgaged risk!</title>
		<link>https://t-rob.net/2009/05/02/the-deep-queue-episode-10-cash-in-on-mortgaged-risk/</link>
					<comments>https://t-rob.net/2009/05/02/the-deep-queue-episode-10-cash-in-on-mortgaged-risk/#respond</comments>
		
		
		<pubDate>Sun, 03 May 2009 02:42:37 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[IBMIMPACT]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=294</guid>

					<description><![CDATA[No, that&#8217;s not mortgage risk.  Someone&#8217;s already done that and look where it got us.  No,I&#8217;m talking about mortgaged risk &#8211; the act of saving time or money by accepting risk that is hard to measure but easy to hide &#8230; <a href="https://t-rob.net/2009/05/02/the-deep-queue-episode-10-cash-in-on-mortgaged-risk/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>No, that&#8217;s not <em>mortgage</em> risk.  Someone&#8217;s already done that and look where it got us.  No,I&#8217;m talking about <em>mortgaged</em> risk &#8211; the act of saving time or money by accepting risk that is hard to measure but easy to hide or ignore.  The risk is essentially a mortgage on your future.  A hidden cost that will be paid eventually.</p>
<p><img decoding="async" align=right hspace=6 vspace=3 border=1 title="WMQ security as practised in the real world" src="http://t-rob.net/wp-content/uploads/2009/05/safemqatxxxbank_thumb.jpg" alt="WMQ security as practised in the real world" />In this episode of The Deep Queue I consider just how much risk has been stuffed into the closet over the years.  There&#8217;s a lot of unsecured MQ out there, after all.  Up to now I&#8217;ve focused on what it means to the companies who are exposed.  But this month I propose that this massive amount of deferred investment represents a great opportunity for companies positioned to perform assessments, implement remediations, or provide tools.</p>
<p>On the lighter side, listener email this month included a funny cartoon which I hope you enjoy.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/05/02/the-deep-queue-episode-10-cash-in-on-mortgaged-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">294</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>The Deep Queue – Episode #9: Going postal about WMQ security</title>
		<link>https://t-rob.net/2009/04/02/the-deep-queue-episode-9-going-postal-about-wmq-security/</link>
					<comments>https://t-rob.net/2009/04/02/the-deep-queue-episode-9-going-postal-about-wmq-security/#respond</comments>
		
		
		<pubDate>Fri, 03 Apr 2009 03:35:28 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<category><![CDATA[WebSphere MQ Security]]></category>
		<category><![CDATA[WMQ]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=249</guid>

					<description><![CDATA[This episode of The Deep Queue takes its inspiration from the thousandth time I was asked how to &#8220;turn on MQ security&#8221;.  Yes, that&#8217;s right, the thousandth time.  At least since I&#8217;ve been counting.  There were perhaps half a thousand &#8230; <a href="https://t-rob.net/2009/04/02/the-deep-queue-episode-9-going-postal-about-wmq-security/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>This episode of The Deep Queue takes its inspiration from the thousandth time I was asked how to &#8220;turn on MQ security&#8221;.  Yes, that&#8217;s right, the thousandth time.  At least since I&#8217;ve been counting.  There were perhaps half a thousand instances before I started keeping track.  Unlike being the millionth customer at the local hair salon, you don&#8217;t want to be the thousandth person to ask me how to &#8220;turn on MQ security&#8221;.</p>
<p>&#8220;What do you mean &#8216;turn on&#8217; security?&#8221; I asked.  &#8220;What is it exactly you want security to do for you?&#8221;</p>
<p>&#8220;Well, you know&#8230;SECURE THE QUEUE MANAGER!&#8221; came the annoyed reply.</p>
<p>&#8220;What I mean is, are you trying to protect from eavesdropping, denial of service, message injection or what?  And do you want prevention, detection or forensic capabilities?&#8221;</p>
<p>Since nobody there had thought about it in these terms, the answer back was &#8220;I don&#8217;t know, we will get back to you.&#8221;  My dilemma is that if I have a ready-made answer for &#8220;how to turn on MQ security&#8221; it is likely not to address the real requirements&#8230;but at least I get work.  If I try to drive out the real requirements, I put myself on the bench.</p>
<p>[display_podcast]</p>
<p>Links for this episode:<br />
WMQ Security webinar for QSA&#8217;s, internal auditors, security professionals and anyone interested in knowing how to tell if your WebSphere MQ network leaks administrative access: PCIKnowledgebase.com <a href="http://is.gd/qqOX" target="_blank">http://is.gd/qqOX</a></p>
<p>The Black Swan by Nassim Nicholas Taleb:  <a href="http://is.gd/qqXX" target="_blank">http://is.gd/qqXX</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/04/02/the-deep-queue-episode-9-going-postal-about-wmq-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">249</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>The Deep Queue – Episode #8: The good news and the bad news</title>
		<link>https://t-rob.net/2009/02/27/the-deep-queue-episode-8-the-good-news-and-the-bad-news/</link>
					<comments>https://t-rob.net/2009/02/27/the-deep-queue-episode-8-the-good-news-and-the-bad-news/#comments</comments>
		
		
		<pubDate>Sat, 28 Feb 2009 02:20:39 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[Errata]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[MQMFT]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<category><![CDATA[WebSphere MQ Security]]></category>
		<category><![CDATA[WMQ]]></category>
		<category><![CDATA[WMQ FTE]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=231</guid>

					<description><![CDATA[This episode of The Deep Queue contains news about the new MSoT stand-alone WMQ Explorer SupportPac, yet another payment processor data breach, updates to some items we&#8217;ve covered in the past and breaking news about a WebSphere MQ interim fix &#8230; <a href="https://t-rob.net/2009/02/27/the-deep-queue-episode-8-the-good-news-and-the-bad-news/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>This episode of The Deep Queue contains news about the new MSoT stand-alone WMQ Explorer SupportPac, yet another payment processor data breach, updates to some items we&#8217;ve covered in the past and breaking news about a WebSphere MQ interim fix that many people will want to take a close look at.</p>
<p><span id="more-231"></span>One of the items in the podcast suggests some corrections to scripts listed in the &#8220;<a title="Using MQ Explorer as a read-only viewer" href="http://hursleyonwmq.wordpress.com/2007/02/08/using-websphere-mq-explorer-as-a-read-only-viewer/" target="_blank">Using MQ Explorer as a read-only viewer</a>&#8221; post over at the <a title="A Hursley View on WebSphere MQ blog" href="http://hursleyonwmq.wordpress.com/" target="_blank">Hursley View on WebSphere MQ</a> blog.  I have excerpted a portion of the setmqaut commands from that post here:</p>
<pre><code>
setmqaut -m YOUR_QUEUE_MANAGER -t q -n SYSTEM.DEFAULT.MODEL.QUEUE -p YOUR_USER_NAME +get +browse +inq
setmqaut -m YOUR_QUEUE_MANAGER -t q -n 'AMQ.**' -p YOUR_USER_NAME +all
setmqaut -m YOUR_QUEUE_MANAGER -t q -n 'MQAI.**' -p YOUR_USER_NAME +all
</code></pre>
<p>My recommendation is to delete the last two lines.  When you create a dynamic queue, MQ grants you complete access to the queue.  There is no need to pre-authorize that access.  The effect of the two commands above is to grant you ALL access to ALL dynamic queues that match the AMQ.** or MQAI.** profiles.</p>
<p>So for example, if you have an application that uses AMQ.** as it&#8217;s dynamic queue name prefix, anyone using the rights granted above can read messages from your dynamic queue as they arrive, update them, and write them back to the queue in one transaction.  Your application will never be aware of this man-in-the-middle attack and I have complete control over the responses your application sees.</p>
<p>Of course, the -p should be changed to a -g as well to force the user to explicitly select the group that is authorized.  The -p option only works the way you expect on Windows servers, and then only if the principal is fully qualified, such as <span style="color: #008000;">-p user@domain</span> or <span style="color: #008000;">-p user@host</span>.</p>
<p><strong>Links for this episode:</strong></p>
<p>MSoT SupportPac – Stand-alone WebSphere MQ Explorer<br />
<a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg24021041">http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg24021041</a></p>
<p>Latest payment processor breach coverage from DataBreaches.net</p>
<p style="padding-left: 30px;"><em>Just weeks after Heartland breach, another payment processor said to be hit</em><br />
<a href="http://www.databreaches.net/?p=1728">http://www.databreaches.net/?p=1728</a></p>
<p style="padding-left: 30px;"><em>And the rumor mills kick into higher gear</em><br />
<a href="http://www.databreaches.net/?p=1756">http://www.databreaches.net/?p=1756</a></p>
<p style="padding-left: 30px;"><em>No, the unnamed processor breach is not another Heartland breach</em><br />
<a href="http://www.databreaches.net/?p=1807">http://www.databreaches.net/?p=1807</a></p>
<p>US Department of Justice<br />
<em>Two plead guilty to defrauding trucking companies in multi-million dollar scheme that used Internet site</em><br />
<a href="http://www.usdoj.gov/criminal/cybercrime/lakesPlea.pdf">http://www.usdoj.gov/criminal/cybercrime/lakesPlea.pdf</a></p>
<p>developerWorks article: <em>Securing WebSphere MQ File Transfer Edition V7</em><br />
<a href="http://www.ibm.com/developerworks/websphere/library/techarticles/0902_wyatt/0902_wyatt.html">http://www.ibm.com/developerworks/websphere/library/techarticles/0902_wyatt/0902_wyatt.html</a></p>
<p>Blog: A Hursley View on WebSphere MQ<br />
<em>Using WebSphere MQ Explorer as a read-only viewer</em><br />
<a href="http://hursleyonwmq.wordpress.com/2007/02/08/using-websphere-mq-explorer-as-a-read-only-viewer/">http://hursleyonwmq.wordpress.com/2007/02/08/using-websphere-mq-explorer-as-a-read-only-viewer/</a></p>
<p>APAR  IC58952: INCORRECT C and .NET CLIENT RC WHEN SCYEXIT CLOSES CHANNEL<br />
<a href="http://www-01.ibm.com/support/docview.wss?uid=swg1IC58952">http://www-01.ibm.com/support/docview.wss?uid=swg1IC58952</a></p>
<p>APAR IC58878: MANAGED WMQ V7 .NET ERRORS USING SECURITY EXITS<br />
<a href="http://www-01.ibm.com/support/docview.wss?uid=swg1IC58878">http://www-01.ibm.com/support/docview.wss?uid=swg1IC58878</a></p>
<p>WebSphere MQ planned maintenance release dates<br />
<a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg27006309">http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg27006309</a></p>
<p>Combined interim fix for Data Integrity APAR IC60063 and Security Vulnerability<br />
<a href="http://www-01.ibm.com/support/docview.wss?uid=swg24022268">http://www-01.ibm.com/support/docview.wss?uid=swg24022268</a></p>
<p style="padding-left: 30px;">APAR <span style="font-size: small;">IC60063 &#8211; Data integrity exposure for circular logging queue managers<br />
<a href="http://www-01.ibm.com/support/docview.wss?uid=swg24022268">http://www.ibm.com/support/docview.wss?uid=swg1IC60063</a></span></p>
<p style="padding-left: 30px;">APAR IZ40824 – Security vulnerability<br />
<a href="http://xforce.iss.net/xforce/xfdb/48529">http://xforce.iss.net/xforce/xfdb/48529</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/02/27/the-deep-queue-episode-8-the-good-news-and-the-bad-news/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">231</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>The Deep Queue – Episode #7: Reducing your attack surface</title>
		<link>https://t-rob.net/2009/02/02/the-deep-queue-episode-7-reducing-your-attack-surface/</link>
					<comments>https://t-rob.net/2009/02/02/the-deep-queue-episode-7-reducing-your-attack-surface/#respond</comments>
		
		
		<pubDate>Mon, 02 Feb 2009 05:40:16 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<category><![CDATA[WebSphere MQ Security]]></category>
		<category><![CDATA[WMQ]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=219</guid>

					<description><![CDATA[This installment of The Deep Queue is about improving security by reducing the number of attack vectors that are exposed.  Given two systems with equivalent functionality the one with more exposed attack vectors is said to have a &#8220;larger attack &#8230; <a href="https://t-rob.net/2009/02/02/the-deep-queue-episode-7-reducing-your-attack-surface/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>This installment of The Deep Queue is about improving security by reducing the number of attack vectors that are exposed.  Given two systems with equivalent functionality the one with more exposed attack vectors is said to have a &#8220;larger attack surface&#8221;.  As I explain in the podcast, having a smaller attack surface doesn&#8217;t automatically result in a more secure system, but it sure helps.  There&#8217;s a possibility that having a smaller attack surface makes you more likely to be the victim of a hit-and-run driver but you&#8217;ll have to listen to the podcast to understand why.</p>
<p>This episode also contains an installment of Random MQ Stuff.  Links are below.</p>
<p>Subscribe:  <a href="http://feeds.feedburner.com/t-rob/deepqueue"><img decoding="async" title="Deep Queue RSS feed" src="http://www.feedburner.com/fb/images/pub/feed-icon16x16.png" alt="Deep Queue RSS feed" width="16" height="16" /></a><br />
<span id="more-219"></span></p>
<p><strong>Links for this episode:</strong></p>
<p>Minimize attack surface area (OWASP) &#8211;<br />
<a href="http://www.owasp.org/index.php/Minimize_attack_surface_area" target="_blank">http://www.owasp.org/index.php/Minimize_attack_surface_area</a></p>
<p>WebSphere MQ Fix Pack 7.0.0.1 &#8211; <a href="http://is.gd/i1Da" target="_blank">http://is.gd/i1Da</a></p>
<p>APAR&#8217;s in 7.0.0.1 cited in this podcast: <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IC56408" target="_blank">IC56408</a>, <a href="http://www.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IC58577" target="_blank">IC58577</a>, <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IC58797" target="_blank">IC58797</a>, <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IZ17158" target="_blank">IZ17158</a>, <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IZ18954" target="_blank">IZ18954</a>, <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IZ27491" target="_blank">IZ27491</a>, <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IZ27588" target="_blank">IZ27588</a>, <a href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg1IZ28844" target="_blank">IZ28844</a></p>
<p>SupportPac MS03 &#8211; <a href="http://is.gd/i1Da">http://is.gd/i1Da</a></p>
<p>IBM Consumability Surveys<br />
Managing WebSphere Products &#8211; <a href="http://is.gd/i1Da">http://is.gd/i1Da<br />
</a>WebSphere MQ API Exerciser Survey &#8211; <a href="http://is.gd/i1GL">http://is.gd/i1GL</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/02/02/the-deep-queue-episode-7-reducing-your-attack-surface/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">219</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>The Deep Queue – Episode #6: The Myth of the Trusted Internal Network</title>
		<link>https://t-rob.net/2009/01/01/the-deep-queue-episode-6-the-myth-of-the-trusted-internal-network/</link>
					<comments>https://t-rob.net/2009/01/01/the-deep-queue-episode-6-the-myth-of-the-trusted-internal-network/#comments</comments>
		
		
		<pubDate>Thu, 01 Jan 2009 18:57:22 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<category><![CDATA[commentary]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WebSphere MQ]]></category>
		<category><![CDATA[WebSphere MQ Security]]></category>
		<category><![CDATA[WMQ]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=195</guid>

					<description><![CDATA[In this episode of The Deep Queue I explain why I believe the &#8220;trusted internal network&#8221; is a myth.  Many of the problems that I see on consulting assignments would have been prevented by the same security measures I recommend &#8230; <a href="https://t-rob.net/2009/01/01/the-deep-queue-episode-6-the-myth-of-the-trusted-internal-network/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>In this episode of The Deep Queue I explain why I believe the &#8220;trusted internal network&#8221; is a myth.  Many of the problems that I see on consulting assignments would have been prevented by the same security measures I recommend to protect against malicious attacks.  Except the incidents in question are not usually malicious, they are just human error.  In most of these cases the fact that there are no secondary firewalls around Production assets, no defense in depth and no checks and balances allows a simple mistake to blossom into a full-scale incident with serious financial, and often reputational, damage.</p>
<p style="margin-bottom: 0in;">But if companies don&#8217;t want to implement security to protect against honest mistakes, perhaps they will if there is a credible outsider threat.  In this episode I argue that such a threat is real and to back that up I cite six US DOJ press releases from just the last two months describing malicious corporate network intrusions.  The press releases also give us some insight into the state of tools available for cybercriminals and the degree to which the tools have been weaponized.</p>
<p style="margin-bottom: 0in;"><span id="more-195"></span></p>
<p style="margin-bottom: 0in;">Links for this episode:</p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">SAN JOSE WOMAN CHARGED WITH FRAUD IN CONNECTION WITH A PROTECTED COMPUTER<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/leotiotaIndict.pdf"><br />
http://www.usdoj.gov/criminal/cybercrime/leotiotaIndict.pdf</a></p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">FORMER IT MANAGER SENTENCED TO PRISON FOR HACKING INTO PREVIOUS EMPLOYER’S COMPUTER SYSTEM AND CAUSING DAMAGE<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/barnesSent.pdf"><br />
http://www.usdoj.gov/criminal/cybercrime/barnesSent.pdf</a></p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">JUVENILE COMPUTER HACKER PLEADS GUILTY<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/dshockerPlea.pdf"><br />
http://www.usdoj.gov/criminal/cybercrime/dshockerPlea.pdf</a></p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">Multi-Million Dollar Home Equity Line of Credit, Identity Theft and Computer Intrusion Ring Busted<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/polkCharge.pdf"><br />
http://www.usdoj.gov/criminal/cybercrime/polkCharge.pdf</a></p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">HACKER CHARGED WITH PROVIDING DATA THEFT TOOL IN NATIONAL IDENTITY THEFT CASE<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/wattCharge.pdf"><br />
http://www.usdoj.gov/criminal/cybercrime/wattCharge.pdf</a></p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">FORMER MASSACHUSETTS INMATE ARRESTED FOR HACKING PRISON COMPUTER TO ACCESS PRISON MANAGEMENT PROGRAM<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/janoskoIndict.pdf"><br />
http://www.usdoj.gov/criminal/cybercrime/janoskoIndict.pdf</a></p>
<p style="margin-bottom: 0in;">
<p style="margin-bottom: 0in;">Boffins bust web authentication with game consoles<br />
<a href="http://www.theregister.co.uk/2008/12/30/ssl_spoofing/"><br />
http://www.theregister.co.uk/2008/12/30/ssl_spoofing/</a></p>
<p style="margin-bottom: 0in;">
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2009/01/01/the-deep-queue-episode-6-the-myth-of-the-trusted-internal-network/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">195</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
		<item>
		<title>The Deep Queue – Episode #5: WMQ Security news and Random WMQ Stuff</title>
		<link>https://t-rob.net/2008/12/02/the-deep-queue-episode-5-wmq-security-news-and-random-wmq-stuff/</link>
					<comments>https://t-rob.net/2008/12/02/the-deep-queue-episode-5-wmq-security-news-and-random-wmq-stuff/#respond</comments>
		
		
		<pubDate>Tue, 02 Dec 2008 08:30:09 +0000</pubDate>
				<category><![CDATA[DeepQueue]]></category>
		<category><![CDATA[IBMMQ]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[WMQ Security]]></category>
		<guid isPermaLink="false">http://t-rob.net/?p=171</guid>

					<description><![CDATA[The Deep Queue Episode #5 is now online.  In this episode we cover some WMQ security news and introduce a new segment called Random WMQ Stuff which is pretty much what it sounds like.  We also now have an iTunes &#8230; <a href="https://t-rob.net/2008/12/02/the-deep-queue-episode-5-wmq-security-news-and-random-wmq-stuff/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>The Deep Queue Episode #5 is now online.  In this episode we cover some WMQ security news and introduce a new segment called Random WMQ Stuff which is pretty much what it sounds like.  We also now have an iTunes feed.  Please let me know if you have any problems with it.  The link to the iTunes feed and all the other links are posted below.</p>
<p><span id="more-171"></span></p>
<p>Links for this episode:<br />
<a title="DeepQueue iTunes feed" href="http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=298285838" target="_blank"><br />
Deep Queue iTunes feed</a></p>
<p><a title="IMPACT 2009 Call For Speakers web page" href="http://www-01.ibm.com/software/websphere/events/impact2009/" target="_blank">IMPACT 2009<br />
IMPACT 2009 Call for Speakers</a></p>
<p>Prolifics presentation <a title="Prolifics WMQ Enterprise Security presentation" href="http://www.prolifics.com/demos/impact2008/MQSecurityStrategyImpact2008_rfs.pdf" target="_blank">WebSphere MQ Enterprise Security: A Series of Defenses to Withstand the Test of Time</a></p>
<p><a title="The CVE web site at MITRE" href="http://cve.mitre.org/cve/index.html" target="_blank">MITRE CVE web site</a><br />
<a href="http://nvd.nist.gov/ wmqsecurity deepqueue:episode005 software security search reference computing vulnerabilities vulnerability infosec hacking hack" target="_blank">US National Vulnerability Database</a></p>
<p><a title="Fix list for WMQ 5.3 on HP Non-Stop" href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg27009174" target="_blank">Fix list for WMQ 5.3 on HP Non-Stop</a><br />
<a title="Fix list for WMQ 6.0" href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg27007069" target="_blank">Fix list for WMQ 6.0</a></p>
<p><a title="MWR Infosecurity Events page" href="http://www.mwrinfosecurity.com/events.php" target="_blank">MWR Infosecurity Events page</a><br />
<a title=" MWR Infosecurity Middleware Threats presentation" href="http://www.mwrinfosecurity.com/publications/mwri_middleware-threats-presentation_2008-10-14.pdf" target="_blank"> MWR Infosecurity Middleware Threats presentation</a><br />
<a title="MWR Infosecurity Labs" href="http://labs.mwrinfosecurity.com/" target="_blank">MWR Infosecurity Labs</a></p>
<p><a title="WMQ File Transfer Edition home page" href="http://www-01.ibm.com/software/integration/wmq/filetransfer/" target="_blank">WebSphere MQ File Transfer Edition</a><br />
<a title="WMQ FTE Availability announcement" href="http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=ca&amp;infotype=an&amp;appname=iSource&amp;supplier=897&amp;letternum=ENUS208-331" target="_blank">WMQ FTE Availability</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://t-rob.net/2008/12/02/the-deep-queue-episode-5-wmq-security-news-and-random-wmq-stuff/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">171</post-id>	<dc:creator>dq@t-rob.net (T.Rob Wyatt)</dc:creator></item>
	</channel>
</rss>