Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Workspace z/OS
Categories SMP/E
Created by Guest
Created on Feb 22, 2024

SMP/E Root CA certificate change request

Current IBM SMP/E Root certificate, DigiCert Global Root CA, is using weak SHA1 algorithm. We are working on replacing all certificates using SHA1 with much more secure SHA256.

Many vendors already switched their SMP/E client certificates to use Root CA with SHA256. I think it is reasonable to ask, that IBM also updates their certificates.

Idea priority Medium
  • Guest
    Reply
    |
    Feb 26, 2024
    The issuing intermediate CA for IBM's Automated Service Request server used by SMP/E RECEIVE ORDER (eccgw01.boulder.ibm.com) is a SHA-256 certificate, even though the root CA is a SHA-1 certificate.

    A trust chain is built by verifying the issuer of the certificate up to the root CA, which is pre-trusted by definition, unlike the verification process performed for the intermediate CA(s). That is why SHA-1 root CAs are still widely used in many well-known Certificate Authorities.

    When the IBM server certificate expires IBM will request a new certificate originating from a stronger root CA.

    Here is the complete chain currently:
    - The root cert's signature uses the SHA-1 with RSA algorithm. This is DigiCert Global Root CA. This signature does not need to be verified, as it is a root CA and is pre-trusted.
    - The intermediate cert's signature uses SHA-256 with RSA. This is DigiCert TLS RSA SHA2456 certificate. This is the issuer of the IBM server cert, and is the one that matters in this chain.
    - The IBM server's cert's signature uses SHA-256 with RSA.