Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Future consideration
Workspace z/OS
Created by Guest
Created on Sep 5, 2025

Control Over TCP Listeners Binding to Port 0

Description:
Our organization enforces strict controls over all TCP listeners on our stack using the UNRSV TCP DENY WHEN LISTEN logic and SAF resource keyword definitions. This approach ensures that only authorized listeners, explicitly defined in our Port statement, are permitted to start.

However, we have identified a significant gap: applications can bypass these controls by binding to port 0. In this scenario, the TCP/IP stack assigns a random ephemeral port that is not registered in our Port statement. This behavior prevents us from:

  • Enforcing listener controls,
  • Creating effective filter rules,
  • Auditing and monitoring listener activity,
  • Maintaining compliance with internal and regulatory requirements.

Business Impact:

  • Security Risk: Uncontrolled listeners may be created, exposing the environment to unauthorized access or data exfiltration.
  • Compliance Risk: Inability to audit or control all network listeners may violate regulatory or internal policy requirements.
  • Operational Risk: Filter rules and monitoring cannot be reliably applied, increasing the risk of undetected or unauthorized network activity.

We would like IBM to build a solution that closes this allowing us to control this behavior and be able to assign SAF controls through the EZB.PORTACCESS like we do for other ports

 

Idea priority Medium