Deprecated and removed CipherSpecs
A list of deprecated CipherSpecs that you are able to use with IBM® MQ if necessary
and a list of removed
CipherSpecs that are no longer supported with IBM MQ.
Deprecated CipherSpecs
Deprecated CipherSpecs that you can use with IBM MQ TLS support are listed in the following table.
| Platform support 1 | CipherSpec name | Hex code | Protocol used | Data integrity | Encryption algorithm (encryption bits) | FIPS 2 | Suite B | Update when deprecated |
|---|---|---|---|---|---|---|---|---|
| CipherSpecs for SSL 3.0 | ||||||||
|
|
AES_SHA_US
3
14 |
002F | SSL 3.0 | SHA-1 | AES (128) | No | No | 9.0.0.0 |
|
All |
DES_SHA_EXPORT
3
4
5
14 |
0009 | SSL 3.0 | SHA-1 | DES (56) | No | No | 9.0.0.0 |
|
|
DES_SHA_EXPORT1024
3
6
14 |
0062 | SSL 3.0 | SHA-1 | DES (56) | No | No | 9.0.0.0 |
|
|
FIPS_WITH_DES_CBC_SHA
3
14 |
FEFE | SSL 3.0 | SHA-1 | DES (56) | No7 | No | 9.0.0.0 |
|
|
FIPS_WITH_3DES_EDE_CBC_SHA
3
14 |
FEFF | SSL 3.0 | SHA-1 | 3DES (168) | No8 | No | 9.0.0.1 and 9.0.1 |
| All | NULL_MD5
3
14 |
0001 | SSL 3.0 | MD5 | None | No | No | 9.0.0.1 |
| All | NULL_SHA
3
14 |
0002 | SSL 3.0 | SHA-1 | None | No | No | 9.0.0.1 |
| All | RC2_MD5_EXPORT
3
4
5
14 |
0006 | SSL 3.0 | MD5 | RC2 (40) | No | No | 9.0.0.0 |
| All | RC4_MD5_EXPORT
4
3
14 |
0003 | SSL 3.0 | MD5 | RC4 (40) | No | No | 9.0.0.0 |
| All | RC4_MD5_US
3
14 |
0004 | SSL 3.0 | MD5 | RC4 (128) | No | No | 9.0.0.0 |
| All | RC4_SHA_US
3
5
14 |
0005 | SSL 3.0 | SHA-1 | RC4 (128) | No | No | 9.0.0.0 |
|
|
RC4_56_SHA_EXPORT1024
3
6
14 |
0064 | SSL 3.0 | SHA-1 | RC4 (56) | No | No | 9.0.0.0 |
| All | TRIPLE_DES_SHA_US
3
5
14 |
000A | SSL 3.0 | SHA-1 | 3DES (168) | No | No | 9.0.0.1 and 9.0.1 |
| CipherSpecs for TLS 1.0 | ||||||||
|
|
TLS_RSA_EXPORT_WITH_RC2_40_MD5
3
14 |
0006 | TLS 1.0 | MD5 | RC2 (40) | No | No | 9.0.0.0 |
|
|
TLS_RSA_EXPORT_WITH_RC4_40_MD53
4
14 |
0003 | TLS 1.0 | MD5 | RC4 (40) | No | No | 9.0.0.0 |
| All | TLS_RSA_WITH_DES_CBC_SHA
3
14 |
0009 | TLS 1.0 | SHA-1 | DES (56) | No9 | No | 9.0.0.0 |
|
|
TLS_RSA_WITH_NULL_MD5
3
14 |
0001 | TLS 1.0 | MD5 | None | No | No | 9.0.0.1 |
|
|
TLS_RSA_WITH_NULL_SHA
3
14 |
0002 | TLS 1.0 | SHA-1 | None | No | No | 9.0.0.1 |
|
|
TLS_RSA_WITH_RC4_128_MD5
3
14 |
0004 | TLS 1.0 | MD5 | RC4 (128) | No | No | 9.0.0.0 |
|
|
TLS_RSA_WITH_AES_128_CBC_SHA
10
14 |
002F | TLS 1.0 | SHA-1 | AES (128) |
|
No | 9.0.5 |
|
|
TLS_RSA_WITH_AES_256_CBC_SHA
6
10
14 |
0035 | TLS 1.0 | SHA-1 | AES (256) |
|
No | 9.0.5 |
| All | TLS_RSA_WITH_3DES_EDE_CBC_SHA
14 |
000A | TLS 1.0 | SHA-1 | 3DES (168) |
|
No | 9.0.0.1 and 9.0.1 |
| CipherSpecs for TLS 1.2 | ||||||||
|
|
ECDHE_ECDSA_NULL_SHA256
3
|
C006 | TLS 1.2 | SHA-1 | None | No | No | 9.0.0.1 |
|
|
ECDHE_ECDSA_RC4_128_SHA256
3
14 |
C007 | TLS 1.2 | SHA-1 | RC4 (128) | No | No | 9.0.0.0 |
|
|
ECDHE_RSA_NULL_SHA256
3 |
C010 | TLS 1.2 | SHA-1 | None | No | No | 9.0.0.1 |
|
|
ECDHE_RSA_RC4_128_SHA256
3
14 |
C011 | TLS 1.2 | SHA-1 | RC4 (128) | No | No | 9.0.0.0 |
|
|
TLS_RSA_WITH_NULL_NULL
3
14 |
0000 | TLS 1.2 | None | None | No | No | 9.0.0.1 |
| All | TLS_RSA_WITH_NULL_SHA256
3
14 |
003B | TLS 1.2 | SHA-256 | None | No | No | 9.0.0.1 |
|
|
TLS_RSA_WITH_RC4_128_SHA256
3
14 |
0005 | TLS 1.2 | SHA-1 | RC4 (128) | No | No | 9.0.0.0 |
|
|
ECDHE_ECDSA_3DES_EDE_CBC_SHA256
14 |
C0008 | TLS 1.2 | SHA-1 | 3DES (168) | Yes | No | 9.0.0.1 and 9.0.1 |
|
|
ECDHE_RSA_3DES_EDE_CBC_SHA256
14 |
C012 | TLS 1.2 | SHA-1 | 3DES (168) | Yes | No | 9.0.0.1 and 9.0.1 |
All |
TLS_RSA_WITH_AES_128_CBC_SHA25611
|
003C | TLS 1.2 | SHA-256 | AES (128) |
|
No | 9.4.1 |
All |
TLS_RSA_WITH_AES_256_CBC_SHA256
11
12
|
003D | TLS 1.2 | SHA-256 | AES (256) |
|
No | 9.4.1 |
All |
TLS_RSA_WITH_AES_128_GCM_SHA256
11
13
|
009C | TLS 1.2 | SHA-256 and AEAD GCM | AES (128) |
|
No | 9.4.1 |
All |
TLS_RSA_WITH_AES_256_GCM_SHA38411
12
13
|
009D | TLS 1.2 | SHA-384 and AEAD GCM | AES (256) |
|
No | 9.4.1 |
|
Notes:
|
||||||||
![[MQ 9.4.4 Oct 2025]](ng944.gif)
![[UNIX, Linux, Windows, IBM i]](ngmulti.gif)
Removed CipherSpecs
CipherSpecs that are removed and can no longer be used with IBM MQ for Multiplatforms TLS support are listed in the following table.
| Platform | CipherSpec name | Hex code | Protocol used | Update when deprecated |
|---|---|---|---|---|
| CipherSpecs for SSL 3.0 | ||||
|
|
AES_SHA_US
|
002F | SSL 3.0 | 9.4.4.0 |
|
|
DES_SHA_EXPORT
|
0009 | SSL 3.0 | 9.4.4.0 |
|
|
DES_SHA_EXPORT1024
|
0062 | SSL 3.0 | 9.4.4.0 |
|
|
FIPS_WITH_DES_CBC_SHA
|
FEFE | SSL 3.0 | 9.4.4.0 |
|
|
FIPS_WITH_3DES_EDE_CBC_SHA
|
FEFF | SSL 3.0 | 9.4.4.0 |
|
|
NULL_MD5
|
0001 | SSL 3.0 | 9.4.4.0 |
|
|
NULL_SHA
|
0002 | SSL 3.0 | 9.4.4.0 |
|
|
RC2_MD5_EXPORT
|
0006 | SSL 3.0 | 9.4.4.0 |
|
|
RC4_MD5_EXPORT
|
0003 | SSL 3.0 | 9.4.4.0 |
|
|
RC4_MD5_US
|
0004 | SSL 3.0 | 9.4.4.0 |
|
|
RC4_SHA_US
|
0005 | SSL 3.0 | 9.4.4.0 |
|
|
RC4_56_SHA_EXPORT1024
|
0064 | SSL 3.0 | 9.4.4.0 |
|
|
TRIPLE_DES_SHA_US
|
000A | SSL 3.0 | 9.4.4.0 |
| CipherSpecs for TLS 1.0 | ||||
|
|
TLS_RSA_EXPORT_WITH_RC2_40_MD5
|
0006 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_EXPORT_WITH_RC4_40_MD5
|
0003 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_DES_CBC_SHA
|
0009 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_NULL_MD5
|
0001 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_NULL_SHA
|
0002 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_RC4_128_MD5
|
0004 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_AES_128_CBC_SHA
|
002F | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_AES_256_CBC_SHA
|
0035 | TLS 1.0 | 9.4.4.0 |
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
000A | TLS 1.0 | 9.4.4.0 |
| CipherSpecs for TLS 1.2 | ||||
|
|
ECDHE_ECDSA_RC4_128_SHA256
|
C007 | TLS 1.2 | 9.4.4.0 |
|
|
ECDHE_RSA_RC4_128_SHA256
|
C011 | TLS 1.2 | 9.4.4.0 |
|
|
TLS_RSA_WITH_NULL_NULL
|
0000 | TLS 1.2 | 9.4.4.0 |
|
|
TLS_RSA_WITH_NULL_SHA256
|
003B | TLS 1.2 | 9.4.4.0 |
|
|
TLS_RSA_WITH_RC4_128_SHA256
|
0005 | TLS 1.2 | 9.4.4.0 |
|
|
ECDHE_ECDSA_3DES_EDE_CBC_SHA256
|
C0008 | TLS 1.2 | 9.4.4.0 |
|
|
ECDHE_RSA_3DES_EDE_CBC_SHA256
|
C012 | TLS 1.2 | 9.4.4.0 |
![[UNIX, Linux, Windows, IBM i]](ngmulti.gif)
Enabling deprecated CipherSpecs on IBM MQ for Multiplatforms
By default, you are not allowed to specify a deprecated or removed CipherSpec on a channel definition. If you attempt to specify a deprecated or removed CipherSpec on IBM MQ for Multiplatforms, you receive message AMQ8242: SSLCIPH definition wrong, and PCF returns MQRCCF_SSL_CIPHER_SPEC_ERROR.
You cannot start a channel with a deprecated or removed CipherSpec. If you attempt to do so with such a CipherSpec, the system returns MQCC_FAILED (2), together with a Reason of MQRC_SSL_INITIALIZATION_ERROR (2393) to the client.
You can re-enable one or more of the deprecated CipherSpecs for defining channels, at runtime on the server, by setting the environment variable AMQ_SSL_WEAK_CIPHER_ENABLE.
- A single CipherSpec name, or
- A comma separated list of CipherSpec names to re-enable, or
- The special value of ALL, representing all CipherSpecs.
export AMQ_SSL_WEAK_CIPHER_ENABLE=TLS_RSA_WITH_AES_256_CBC_SHA256or,
alternatively change the SSL stanza in the qm.ini file, by setting:
SSL:
AllowWeakCipherSpec=TLS_RSA_WITH_AES_256_CBC_SHA256
It is not possible to
re-enable removed CipherSpecs.
Note: The SSL .ini stanza attributes
AllowSSLV3 and AllowTLSV1 (as well as their environment
variable counterparts AMQ_SSL_V3_ENABLE and
AMQ_TLS_V1_ENABLE) will always be set as false internally regardless of their
user setting.![[z/OS]](ngzos.gif)
Enabling deprecated CipherSpecs on z/OS
By default, you are not allowed to specify a deprecated CipherSpec on a channel definition. If you attempt to specify a deprecated CipherSpec on z/OS, you receive message CSQM102E, message CSQX616E, or CSQX674E.
- If you want to re-enable the use of weak CipherSpecs, you do so by adding a dummy data
definition (DD) statement named
CSQXWEAKto the channel initiator JCL. If specified on its own, this only enables weak CipherSpecs associated with the TLS 1.2 protocol; for example://CSQXWEAK DD DUMMYNote: Not all deprecated CipherSpecs require the use of this DD statement, see note 10 in the preceding table. - If you want to re-enable the use of SSLv3 CipherSpecs, you do so by also adding a dummy DD
statement named
CSQXSSL3to the channel initiator JCL. All SSLv3 CipherSpecs are considered Weak, so you must also specifyCSQXWEAK://CSQXSSL3 DD DUMMY - If you want to re-enable the deprecated TLS V1 CipherSpecs, you do so by adding a dummy DD
statement named
TLS10ON(turn TLS V1.0 ON) to the channel initiator JCL. If specified on its own, this enables Strong CipherSpecs associated with the TLS 1.0 protocol://TLS10ON DD DUMMYIf specified with
CSQXWEAKthis also enables Weak CipherSpecs associated with TLS 1.0. - If you want to explicitly turn off the deprecated TLS V1 CipherSpecs, you do so by adding a
dummy DD statement named
TLS10OFF(turn TLS V1.0 OFF) to the channel initiator JCL; for example://TLS10OFF DD DUMMY
JCL: //GSKDCIPS DD DUMMY There are alternative mechanisms that can be used to forcibly re-enable weak CipherSpecs, and SSLv3 support, if the Data Definition change is unsuitable. Contact IBM Service for further information.
![[IBM i]](../common/../secure/ngibmi.gif)
![[AIX, Linux, Windows]](../common/../secure/ngalw.gif)
![[z/OS]](../common/../secure/ngzos.gif)
No
Yes
All
This CipherSpec was ![[MQ 9.4.4 Oct 2025]](../common/../secure/ng944.gif)
These CipherSpecs are removed at ![[IBM i]](ngibmi.gif)
![[AIX, Linux, Windows]](ngalw.gif)