Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Workspace z/OS
Categories BCP_Service Aids
Created by Guest
Created on Jan 27, 2020

AMAPDUPL with DHE/ECDHE cipher suites

When using AMAPDUPL with https on www.secure.ecurep.ibm.com TLS 1.2 is required, which is nice. From TS003255137 I know that the server supports the following cipher suites:
•C030 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
•C02F TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
•C028 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
•C027 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
•C024 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
•C025 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
•9C TLS_RSA_WITH_AES_128_GCM_SHA256
•9D TLS_RSA_WITH_AES_256_GCM_SHA384
•3C TLS_RSA_WITH_AES_128_CBC_SHA256
•3D TLS_RSA_WITH_AES_256_CBC_SHA256

Unfortunately only the last four (9C,9D,3C and 3D) can be used by AMAPDUPL. (At least according the information in TS003255137)
To ensure a adequate level of security of our data send to IBM, we ask you to enhance AMAPDUPL in a way that cipher suites with DHE/ECDHE can be used to transport our data to IBM.

Idea priority Medium
  • Guest
    Reply
    |
    Mar 29, 2023
    Compatibility with 4-character cipher suites is implemented via OA63815 on releases HBB77C0 and above.
  • Guest
    Reply
    |
    Jul 18, 2022

    The possible solution for this issue would be the use of the a Comm Server Application-Controlled AT-TLS policy. Unfortunately, as documented in case TS009593994, AMAPDUPL doesn't support AT-TLS.

    We think it wouldn't be so hard to implement this support, because AMAPDUPL uses "z/OS HTTP/HTTPS protocol enabler", that already supports AT-TLS. AMAPDUPL could detect (via Web toolkit) the existence of an AT-TLS policy and so, delegate connection security to TCPIP.

    Additionally, not updating AMAPDUPL with this support, would not allow ECUREP and TESTCASE HTTPS Servers to migrate to TLS 1.3, since this new version only accepts four char ciphers id's.

  • Guest
    Reply
    |
    Jan 28, 2020

    Due to processing by IBM, this request was reassigned to have the following updated attributes:
    Brand - Servers and Systems Software
    Product family - z Systems Software
    Product - z/OS
    Component - BCP_Service Aids
    Operating system - IBM z/OS
    Source - None

    For recording keeping, the previous attributes were:
    Brand - Servers and Systems Software
    Product family - z Systems Software
    Product - z/OS
    Component - Other
    Operating system - IBM z/OS
    Source - None