About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
SYSTEM SSL V2.1 AND TLS/SSL SERVER UPGRADE
APAR Identifier ...... PI40702 Last Changed ........ 16/03/30 SYSTEM SSL V2.1 AND TLS/SSL SERVER UPGRADE Symptom ...... NF NEWFUNCTION Status ........... CLOSED UR1 Severity ................... 4 Date Closed ......... 15/09/10 Component .......... 5735FAL00 Duplicate of ........ Reported Release ......... 630 Fixed Release ............ 999 Component Name TCP/IP V2 FOR V Special Notice Current Target Date .. Flags SCP ................... Platform ............ Status Detail: SHIPMENT - Packaged solution is available for shipment. PE PTF List: PTF List: Release 630 : UI31015 available 16/03/30 (1601 ) Parent APAR: Child APAR list: ERROR DESCRIPTION: In order to maintain FIPS 140-2 and NIST SP 800-131a compliance, z/VM System SSL has been upgraded to z/OS V2.1 equivalency. This introduces internal support for a subset of the cryptographic primitivies found in z/OS ICSF. Use of these primitives is restricted to IBM-provided applications such as the TLS/SSL Server. . This support requires updates to CMS and LE via APARs VM65717 and VM65718. . The TLS/SSL Server has been updated to exploit the following new functions: . -AES Galois-Counter Mode (AES GCM), a TLS 1.2 symmetric key algorithm which is more secure than the current CBC mechanism employed today. . -Enablement of DSA Certificates in MODE NIST -800-131a, an update to the size of the DSS certificates the server can support for asymmetric encryption. LOCAL FIX: PROBLEM SUMMARY: **************************************************************** * USERS AFFECTED: All users of the z/VM SSL server * **************************************************************** * PROBLEM DESCRIPTION: * **************************************************************** * RECOMMENDATION: APPLY PTF * **************************************************************** In order to maintain FIPS 140-2 and NIST SP 800-131a compliance, z/VM System SSL has been upgraded to z/OS V2.1 equivalency. This introduces internal support for a subset of the cryptographic primitives found in z/OS ICSF. Use of these primitives is restricted to IBM-provided applications such as the TLS/SSL servers. This support requires updates to CMS and LE via APARs VM65717 and VM65718. The TLS/SSL Server has been updated to exploit the following new functions: - AES Galois-Counter Mode (AES GCM), a TLS 1.2 symmetric key algorithm which is more secure than the current CBC mechanism employed today. - Enablement of DSA Certificates in MODE NIST-800-131a, an update to the size of the DSS certificates the server can support for asymmetric encryption PROBLEM CONCLUSION: TEMPORARY FIX: COMMENTS: The main things that System SSL 2.1 and inetrnal support for a subset of the cryptographic primitives found in z/OS ICSF are: 1. NIST 800-131 enhancements 2. Suite B Profile for TLS (RFC 5430) support 3. Eliptic Curve Cryptography (ECC) support 4. AES Galois Counter Mode (GCM) support The major changes to TLS/SSL server include: 1. Update the cipher list for AES GCM in SSLCIPHS.C 2. Report the AES GCM availability by changing CMCOMM.COPY and CMNETST.PASCAL 3. Add a new socket call which is used to return an input vector for AES GCM from TCP/IP stack 4. Update the cipher list to reenable DSA for mode NIST-800-131A 5. Change the function which is used to determine the key bit length of the certificate in use for session, support DSA algorithm MODULES/MACROS: CMCOMM CMNETST CMPRCOM CMSOCK GSKCMS31 GSKC31 GSKC31F GSKKYMAN GSKMSGA GSKMSGS GSKSSL GSKSUS31 GSKS31 GSKS31F GSKTRACE ICSFLIB SSLCIPHS SSLGSKCF SSLMNTOR TCIUCAPI TCPBL492 TCPEQUAT TCPIP TCSOCKRE TCVAR SRLS: NONE RTN CODES: CIRCUMVENTION: MESSAGE TO SUBMITTER: