Or it may already be installed, or they may be willing to supply it to you.

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Gibney, Dave
Sent: Monday, August 31, 2020 12:12 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: setting up CSSMTP to use TLS-SSL

If the certificate they present is signed by a recognized CA, you should be 
able to get root and any required intermediates from the signing CA's site.

> -----Original Message-----
> From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On
> Behalf Of Brian Westerman
> Sent: Sunday, August 30, 2020 11:55 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: setting up CSSMTP to use TLS-SSL
> 
> Hi,
> 
> Has anyone on the list set up their CSSMTP client to use TLS-SSL to forward
> the email to a target email server that only supports TLS-SSL?
> 
> I see the steps in the CSSMTP configuration "Steps for using Transport Layer
> Security for CSSMTP", but it's unclear to me where I get the certificate.
> 
> Step 2(a) says:
> 
> a. Create the key ring.
> The client key ring needs the root certification used to sign the server
> certificates. For a TLS/SSL primer and some step-by-step examples, see
> TLS/SSL security. For more information about managing key rings and
> certificates with RACF® and the RACDCERT command, see z/OS Security
> Server RACF Security Administrator's Guide. For more information about
> managing key rings and certificates with gskkyman, see z/OS
> Cryptographic Services System SSL Programming.
> 
> How do I get the root certification used to sign the server certificates?  Is 
> that
> something that the people that take care of the server are supposed to
> supply to me?
> 
> then 2(c) is 5 steps and says:
> c. Configure the client system to use TLS with AT-TLS policies as follows:
> 
> 1) Specify TTLS on the TCPCONFIG statement in the TCP/IP profile for
> the client stack. For information about the TCPCONFIG statement, see
> z/OS Communications Server: IP Configuration Reference.
>    (I understand this one)
> 
> 2) Block the ability of applications to open a socket before AT-TLS policy is
> loaded into the TCP/IP stack by setting up
> EZB.INITSTACK.sysname.tcpname for the client stack.
>     (this seems like a optional step)
> 
> 3) Create a main Policy Agent configuration file containing a TcpImage
> statement for the client stack, and create a TcpImage policy file for the
> client stack.
>     (this seems pretty simple, but where does it go?)
> 
> 4) Add a TTLSConfig statement to each TcpImage policy file to identify the
> TTLSConfig policy file location:
> TTLSConfig clientPath
>     (I am assuming that the clientPath is some USS file I create that 
> indicates
> the information to find the keyring from 2(a) above, is that correct?)  (Where
> does the TcpImage policy file go?  i.e. how do I define it?)
> 
> 5) Add the AT-TLS policy statements to the clientPath file
>     (they have an example for this step right in the manual so that's pretty
> easy to follow)
> 
> Thanks for your help, any examples of a working configuration would be
> really helpful.
> 
> Brian
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to