Linux Server Box running WebSphere MQ Server v7.1:
I have created a user 'mq-user' that belongs to 'mq-users' group in Linux. Then I created a queue manager QM_TEST
, and used MQSC to issue the following commands to create a queue and set up the security:
SET AUTHREC OBJTYPE(QMGR) PRINCIPAL('mq-user') AUTHADD(ALL)
SET AUTHREC PROFILE(SYSTEM.MQEXPLORER.REPLY.MODEL) OBJTYPE(QUEUE) PRINCIPAL('mq-user') AUTHADD(INQ,DSP,GET)
SET SET AUTHREC PROFILE(SYSTEM.ADMIN.COMMAND.QUEUE) OBJTYPE(QUEUE) PRINCIPAL('mq-user') AUTHADD(INQ,DSP,PUT)
DEFINE CHANNEL (TEST_CHANNEL) CHLTYPE (SVRCONN) TRPTYPE (TCP) MCAUSER('mq-user')
SET CHLAUTH(TEST_CHANNEL) TYPE(ADDRESSMAP) ADDRESS(*) MCAUSER('mq-user')
DEFINE QLOCAL (TEST_QUEUE)
SET AUTHREC PROFILE(TEST_QUEUE) OBJTYPE(QUEUE) PRINCIPAL('mq-user') AUTHADD(ALL)
DEFINE LISTENER (TEST_LISTENER) TRPTYPE (TCP) CONTROL (QMGR) PORT (1414)
START LISTENER (TEST_LISTENER)
Linux Client Box running WebSphere MQ Client v7.1 and WebSphere MQ Explorer:
I am logged in as my username (arrehman) which is not part of mq-users group. However I am able to access the queue I created above both via a Java Application and via MQ Explorer client without passing any user credentials. Why is it this way if security is in effect?
Any further details needed, please let me know. Thanks.
This line:
SET CHLAUTH(TEST_CHANNEL) TYPE(ADDRESSMAP) ADDRESS(*) MCAUSER('mq-user')
Says the following:
TEST_CHANNEL
...mq-user
In other words, enable the channel such that any connections inherit the privileges of
mq-user
regardless of where they originate and what identity they present. So the behavior you are seeing is the expected behavior based on theCHLAUTH
rule above.There are a few other problems with the rules as listed:
PRINCIPAL
rather thanGROUP
. On non-windows servers if you specifyPRINCIPAL
what happens is that the QMgr looks up that ID, queries its primary group and then sets authorizations based on that. So ifmq-users
has a primary group ofstaff
orusers
that that is what gets authorized instead ofmq-users
and is probably not what you intended. Always usegroup
so that you get the result you intend withsetmqaut
orAUTHREC
.ALL
on the QMgr makes the ID/group administrative. One of the privileges at the QMgr level isSET
and any user in a group withSET
rights can set, among other things, authorization control lists. So even though you only grantedAUTHADD(INQ,DSP,PUT)
themq-users
ID can submit PCF commands to grant all access to all objects. Only grantCONNECT
andINQUIRE
on the QMgr if that's all you need.USERSRC(CHANNEL)
on the mapping, then your ID would have been used and most likely rejected. But the rejection would have been either because it is in themqm
group (which is blocked by a defaultCHLAUTH
rule) or because there are noAUTHREC
records for the group it is in.For more about hardening WMQ, there are a number of resources collected here. The Hardening WebSphere MQ presentation is from v7.0. Although v7.1 has new controls, the principals remain the same:
MCAUSER
value by hard-coding it in the channel or by using an exit orCHLAUTH
rule to dynamically set it