This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
The Root-Certificate used to sign the Server-Certificates for the SMP/E Download Servers (deliverycb-bld.dhe.ibm.com/ deliverycb-mul.dhe.ibm.com) has been created with an old SHA1 algorithm.
We would like to ask, if you could create new Server-Certificates and have them signed with a newer and more secure Root-Certificate.
Idea priority | Medium |
By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.
A trust chain is built by verifying the issuer of the certificate up to the root CA, which is pre-trusted by definition, unlike the verification process involves in the intermediate CA(s). That?s why SHA-1 root CAs are still widely used in many well-known CAs.
When IBM switches to request all certificates originate from a stronger root CA, SMP/E usage would be amongst all the other IBM products to get such certificate. It would be a corporate-wide policy, and not specific to these specific download servers.
Here is the complete chain today:
? The root cert's signature uses the SHA-1 with RSA algorithm. This is our DigiCert Global Root CA. This signature does not need to be verified, as it is root CA and is pre-trusted.
? The intermediate cert's signature uses SHA-256 with RSA. This is our DigiCert TLS RSA SHA2456 certificate. This is the issuer of the IBM server cert, and is the one that matters in this chain.
? The IBM server's cert's signature uses SHA-256 with RSA.