This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
When using AMAPDUPL with https on www.secure.ecurep.ibm.com TLS 1.2 is required, which is nice. From TS003255137 I know that the server supports the following cipher suites:
•C030 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
•C02F TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
•C028 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
•C027 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
•C024 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
•C025 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
•9C TLS_RSA_WITH_AES_128_GCM_SHA256
•9D TLS_RSA_WITH_AES_256_GCM_SHA384
•3C TLS_RSA_WITH_AES_128_CBC_SHA256
•3D TLS_RSA_WITH_AES_256_CBC_SHA256
Unfortunately only the last four (9C,9D,3C and 3D) can be used by AMAPDUPL. (At least according the information in TS003255137)
To ensure a adequate level of security of our data send to IBM, we ask you to enhance AMAPDUPL in a way that cipher suites with DHE/ECDHE can be used to transport our data to IBM.
Idea priority | Medium |
By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.
The possible solution for this issue would be the use of the a Comm Server Application-Controlled AT-TLS policy. Unfortunately, as documented in case TS009593994, AMAPDUPL doesn't support AT-TLS.
We think it wouldn't be so hard to implement this support, because AMAPDUPL uses "z/OS HTTP/HTTPS protocol enabler", that already supports AT-TLS. AMAPDUPL could detect (via Web toolkit) the existence of an AT-TLS policy and so, delegate connection security to TCPIP.
Additionally, not updating AMAPDUPL with this support, would not allow ECUREP and TESTCASE HTTPS Servers to migrate to TLS 1.3, since this new version only accepts four char ciphers id's.
Due to processing by IBM, this request was reassigned to have the following updated attributes:
Brand - Servers and Systems Software
Product family - z Systems Software
Product - z/OS
Component - BCP_Service Aids
Operating system - IBM z/OS
Source - None
For recording keeping, the previous attributes were:
Brand - Servers and Systems Software
Product family - z Systems Software
Product - z/OS
Component - Other
Operating system - IBM z/OS
Source - None