Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Workspace z/OS
Categories Order/Distr/Install
Created by Guest
Created on Mar 15, 2023

Strengthen the Certificate that authenticates SMP/E Download-Servers (deliverycb-bld.dhe.ibm.com/ deliverycb-mul.dhe.ibm.com)

The Root-Certificate used to sign the Server-Certificates for the SMP/E Download Servers (deliverycb-bld.dhe.ibm.com/ deliverycb-mul.dhe.ibm.com) has been created with an old SHA1 algorithm.

We would like to ask, if you could create new Server-Certificates and have them signed with a newer and more secure Root-Certificate.



Idea priority Medium
  • Guest
    Reply
    |
    Apr 17, 2023
    In fact, the issuing CA of the SMP/E Download-Server is a SHA-256 certificate, although the root CA is a SHA-1 certificate.

    A trust chain is built by verifying the issuer of the certificate up to the root CA, which is pre-trusted by definition, unlike the verification process involves in the intermediate CA(s). That?s why SHA-1 root CAs are still widely used in many well-known CAs.

    When IBM switches to request all certificates originate from a stronger root CA, SMP/E usage would be amongst all the other IBM products to get such certificate. It would be a corporate-wide policy, and not specific to these specific download servers.

    Here is the complete chain today:
    ? The root cert's signature uses the SHA-1 with RSA algorithm. This is our DigiCert Global Root CA. This signature does not need to be verified, as it is root CA and is pre-trusted.
    ? The intermediate cert's signature uses SHA-256 with RSA. This is our DigiCert TLS RSA SHA2456 certificate. This is the issuer of the IBM server cert, and is the one that matters in this chain.
    ? The IBM server's cert's signature uses SHA-256 with RSA.