A fix is available
APAR status
Closed as program error.
Error description
SHA2 related hash algorithms reported as SHA-224, SHA-256, SHA-384 and SHA-512 which does not match Comms Server IP. For example, Communications Server IP zERT SMF records and Network Configuration Assistant define message authentication algorithm HMAC-SHA2-384, while zSecure reports HMAC-SHA-384 in SMF reporting. To be consistent, zSecure should also report HMAC-SHA2-384.
Local fix
N/A
Problem summary
**************************************************************** * USERS AFFECTED: Users of zSecure Audit exploiting SMF * * reports. * **************************************************************** * PROBLEM DESCRIPTION: zSecure Audit reports some values of * * various fields (SMF reports) related to * * authentication method incorrectly. * * The affected fields are: * * o IKE_TUNNEL_AUTH_METHOD. * * o IPSEC_TUNNEL_AUTH_METHOD. * * o SSH_INBOUND_AUTH_METHOD * * o SSH_OUTBOUND_AUTH_METHOD. * * o TLS_MSG_AUTH_METHOD. * * Same applies to the * * IKE_TUNL_PSEUDO_RANDOM_F field. * **************************************************************** * RECOMMENDATION: Apply the PTF provided and review the * * documentation updates. * **************************************************************** Various SMF fields related to authentication methods and the field IKE_TUNL_PSEUDO_RANDOM_F (Pseudo-random function used for seeding IKE tunnel keying material) might display following values: HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-256-128, HMAC-SHA-384-192, and HMAC-SHA-512-256. These values are incorrect. The 'SHA' part should be 'SHA2'.
Problem conclusion
zSecure Audit has been modified, so that SMF fields IKE_TUNNEL_AUTH_METHOD, IPSEC_TUNNEL_AUTH_METHOD, SSH_INBOUND_AUTH_METHOD, SSH_OUTBOUND_AUTH_METHOD, TLS_MSG_AUTH_METHOD, and IKE_TUNL_PSEUDO_RANDOM_F report correct values. Please note the documentation updates as provided by the APAR tracking comment data.
Temporary fix
Comments
APAR Information
APAR number
OA64000
Reported component name
ZSEC BASE,ADMIN
Reported component ID
5655T0100
Reported release
250
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2022-11-21
Closed date
2022-12-07
Last modified date
2023-01-03
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
UJ09704
Modules/Macros
C2R3SME0 C2R3SMES C2R3SMET C2R3SMFK C2R3SMFN C2R3SMG8 CKAFDEFA CKAOUSMF GKRFDEFA GKROUSMF
Fix information
Fixed component name
ZSEC BASE,ADMIN
Fixed component ID
5655T0100
Applicable component levels
R250 PSY UJ09704
UP22/12/08 P F212
Fix is available
Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSPQTM","label":"IBM Security zSecure Admin"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"250","Line of Business":{"code":"LOB24","label":"Security Software"}}]
Document Information
Modified date:
05 January 2023