IBM Support

PI90112: IMPROVE THE DEFAULT CIPHER SUITES FOR SSLV3, TLSV1.0, TLSV1.1, AND TLSV1.2 IN CACHING PROXY TO REMOVE SEVERAL WEAK CIPHERS.

Fixes are available

8.0.0.15: WebSphere Application Server V8.0 Fix Pack 15
9.0.0.8: WebSphere Application Server traditional V9.0 Fix Pack 8
8.5.5.14: WebSphere Application Server V8.5.5 Fix Pack 14
9.0.0.9: WebSphere Application Server traditional V9.0 Fix Pack 9
9.0.0.10: WebSphere Application Server traditional V9.0 Fix Pack 10
8.5.5.15: WebSphere Application Server V8.5.5 Fix Pack 15
9.0.0.11: WebSphere Application Server traditional V9.0 Fix Pack 11
9.0.5.0: WebSphere Application Server traditional Version 9.0.5 Refresh Pack
9.0.5.1: WebSphere Application Server traditional Version 9.0.5 Fix Pack 1
9.0.5.2: WebSphere Application Server traditional Version 9.0.5 Fix Pack 2
8.5.5.17: WebSphere Application Server V8.5.5 Fix Pack 17
9.0.5.3: WebSphere Application Server traditional Version 9.0.5 Fix Pack 3
9.0.5.4: WebSphere Application Server traditional Version 9.0.5 Fix Pack 4
9.0.5.5: WebSphere Application Server traditional Version 9.0.5 Fix Pack 5
WebSphere Application Server traditional 9.0.5.6
9.0.5.7: WebSphere Application Server traditional Version 9.0.5 Fix Pack 7
9.0.5.8: WebSphere Application Server traditional Version 9.0.5.8
8.5.5.20: WebSphere Application Server V8.5.5.20
8.5.5.18: WebSphere Application Server V8.5.5 Fix Pack 18
8.5.5.19: WebSphere Application Server V8.5.5 Fix Pack 19
9.0.5.9: WebSphere Application Server traditional Version 9.0.5.9
9.0.5.10: WebSphere Application Server traditional Version 9.0.5.10
8.5.5.16: WebSphere Application Server V8.5.5 Fix Pack 16
8.5.5.21: WebSphere Application Server V8.5.5.21
9.0.5.11: WebSphere Application Server traditional Version 9.0.5.11

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Improve the default cipher suites for SSLv3, TLSv1.0, TLSv1.1,
    and TLSv1.2 in Caching Proxy to remove several weak ciphers.
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:  Users of IBM Caching Proxy SSL              *
    ****************************************************************
    * PROBLEM DESCRIPTION: Improve the default cipher suites for   *
    *                      SSLv3, TLSv1.0, TLSv1.1, and TLSv1.2 in *
    *                      Caching Proxy to remove several weak    *
    *                      ciphers.                                *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    Improve the default cipher suites for SSLv3, TLSv1.0, TLSv1.1,
    and TLSv1.2 in Caching Proxy to remove weak ciphers such as
    3DES.
    The new default ciphers have been listed below:
    SSLv3 / TLSv1.0 / TLSv1.1:
    * 2F - TLS_RSA_WITH_AES_128_CBC_SHA
    * 35 - TLS_RSA_WITH_AES_256_CBC_SHA
    TLSv1.2:
    * 9C - TLS_RSA_WITH_AES_128_GCM_SHA256
    * 9D - TLS_RSA_WITH_AES_256_GCM_SHA384
    * 3C - TLS_RSA_WITH_AES_128_CBC_SHA256
    * 3D - TLS_RSA_WITH_AES_256_CBC_SHA256
    * 2F - TLS_RSA_WITH_AES_128_CBC_SHA
    * 35 - TLS_RSA_WITH_AES_256_CBC_SHA
    

Problem conclusion

  • The default ciphers for Caching Proxy have been modified. The
    new defaults are listed below for each protocol.
    
    SSLv3 / TLSv1.0 / TLSv1.1:
    * 2F - TLS_RSA_WITH_AES_128_CBC_SHA
    * 35 - TLS_RSA_WITH_AES_256_CBC_SHA
    
    TLSv1.2:
    * 9C - TLS_RSA_WITH_AES_128_GCM_SHA256
    * 9D - TLS_RSA_WITH_AES_256_GCM_SHA384
    * 3C - TLS_RSA_WITH_AES_128_CBC_SHA256
    * 3D - TLS_RSA_WITH_AES_256_CBC_SHA256
    * 2F - TLS_RSA_WITH_AES_128_CBC_SHA
    * 35 - TLS_RSA_WITH_AES_256_CBC_SHA
    
    3DES (0A) ciphers can be re-enabled using the following
    directives as needed:
    V3CipherSpecs 2F350A
    TLSV11CipherSpecs 2F350A
    TLSV12CipherSpecs 9C9D3C3D2F350A
    
    This fix is targeted for IBM Caching Proxy fix packs:
    - 9.0.0.8
    - 8.5.5.14
    - 8.0.0.15
    

Temporary fix

Comments

APAR Information

  • APAR number

    PI90112

  • Reported component name

    WEBS CACH PROXY

  • Reported component ID

    5724H8810

  • Reported release

    900

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2017-11-13

  • Closed date

    2018-03-05

  • Last modified date

    2018-03-05

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    WEBS CACH PROXY

  • Fixed component ID

    5724H8810

Applicable component levels

  • R800 PSY

       UP

  • R850 PSY

       UP

  • R900 PSY

       UP

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"900","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
04 May 2022