The check is "optional" on the application's part for z/OS System SSL:

https://www.ibm.com/docs/en/zos/2.5.0?topic=reference-gsk-validate-server 

I use optional in quotes because the TLS protocol has two main purposes: 
encryption (which is not under discussion here) and preventing a 
man-in-the-middle attack. The server certificate proves the identity of the 
server that the client has actually connected to -- proves that it is not some 
imposter "in the middle." Yes, it is utterly possible for a client application 
to skip that step, but it is a Really Bad Idea.

If the user has specified an IP address then in some senses that is equivalent 
to a URL, except that there is no way to check that the server certificate is 
really for the site the user intended to connect to. (Unless the certificate is 
in fact issued for an IP address -- which is rare.) Actually, some servers now 
will not even allow a connection by IP address: they demand a TLS protocol 
feature called Server Name Indication (SNI) in which the client indicates the 
name they are trying to connect to early in the TLS startup sequence. That lets 
a server respond differently depending on exactly which DNS name the user has 
specified.

Charles

On Mon, 26 Jun 2023 18:57:13 -0700, Tom Brennan <t...@tombrennansoftware.com> 
wrote:

>In my limited (non-mainframe) experience with OpenSSL, I think it's up
>to the application to decide whether to check the common name in a
>validated cert with, say, a URL or IP address string.  So it could be an
>older application didn't bother, and a newer one does.  Just guessing.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to