APAR status
Closed as documentation error.
Error description
After update Java 8.0_64 to SR4 FP5 or FP6. Browsers could not connect to zOSMF. No error messages are obvious. If Java is backed off to 8.0_64 SR4 FP2 or earlier maintainance level, borwsers could get connected to z/OSMF again. This occurs on z/OSMF V2R1, V2R2 and V2R3.
Local fix
For permanent fix, please apply Java APAR PI84229. Recommended Workaround Back off Java to 8.0_64 SR4 FP2 or earlier maintenance level. Before rolling back to previous maintenance level, please visit Java maintenance page at https://www.ibm.com/developerworks/java/jdk/fixes/8/index.html to understand potential Vulnerability Exposure in early maintenance level of Java. Optional Workaround If for some reason, Java maintenance level must stay at SR4 FP5 or FP6. Try the following workarounds on browser side. PLEASE REMOVE THE BROWSER SIDE WORKAROUND AFTER THE PERMANENT FIX IS APPLIED. WORKAROUND: Prior to applying the Java SDK 8 SR4 FP10 Service Refresh, it may be possible to continue using zOSMF by following one of the workarounds below, for the browser in use. These workarounds will change the browser cipher suites which are used during SSL handshakes. In some cases, GCM ciphers will be disabled. In other cases, GCM ciphers will be moved lower in the cipher suite list, reducing the chance of them being selected when connecting to zOSMF. Firefox Browser: The website, http://kb.mozillazine.org/About:config, contains information on how to modify Firefox using about:config. The following steps can be performed in order to remove GCM ciphers from Firefox: 1. Enter about:config in the search browser 2. Search for "security.ssl3". 3. There should be a list of cipher suites with boolean values, such as " security.ssl3.dhe_rsa_aes_128_sha". 4. For all cipher suites which have "gcm", mark the boolean value to false. 5. RESTART Firefox. Note: This workaround is a temporary browser modification. The re-enabling of GCM ciphers will need to occur after installation of the fixed SDK(s) listed above. Restriction: Removing all GCM ciphers from Firefox may prevent connection to other websites if those websites only allow GCM ciphers. Internet Explorer and Edge Browsers: A blog entry from Microsoft,https://blogs.technet.microsoft.com/steriley/2007/11/0 7/changing-the-ssl-cipher-order-in-internet-explorer-7-on-window s-vista/, outlines the instructions to modify the order of the cipher suites for Internet Explorer and Edge: 1. Open the group policy editor by entering gpedit.msc in a Windows "search programs and files" search or Run dialog box. 2. Choose Computer Configuration > Administrative Templates > Network > SSL Configuration Settings. 3. Select SSL Cipher Suite Order. Open with Right Click > Edit. 4. On the left side on the SSL Cipher Suite Order dialog box select Enabled. 5. Under Enabled on the left side, there is an Options section with SSL Cipher Suites. The string in this text field is an ordered list of cipher suites which the browser will use. Edit this list by changing the order of the GCM ciphers ensuring the new entry is a comma delimited value containing no spaces. 1. For example, if the following list was present: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,TLS_RSA_WITH_AES_1 28_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,...moreciphers change it to TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TL S_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,,...moreciphers 6. Click OK and then close gpedit.msc. 7. REBOOT the machine. Note: This workaround is a temporary browser modification. The re-ordering of GCM ciphers will need to occur after installation of the fixed SDK(s) listed above. Restrictions: There may be policy restrictions placed by your System Administrator or versions of Windows which prevents usage of gpedit. In these cases, consider using Firefox temporarily instead. REFERENCES: http://kb.mozillazine.org/About:config https://support.mozilla.org/en-US/questions/916646 https://blogs.technet.microsoft.com/steriley/2007/11/07/changing -the-ssl-cipher-order-in-internet-explorer-7-on-windows-vista/
Problem summary
**************************************************************** * USERS AFFECTED: All users of IBM z/OSMF V2R3, V2R2 and V2R1. * **************************************************************** * PROBLEM DESCRIPTION: After update Java 8.0_64 to SR4 FP5 or * * FP6. Browsers could not connect to * * zOSMF. No error messages are obvious. * **************************************************************** * RECOMMENDATION: * **************************************************************** After update Java 8.0_64 to SR4 FP5 or FP6. z/OSMF could not be connected from browser. No error messages are obvious. If Java is backed off to 8.0_64 SR4 FP2 or earlier maintenance level, z/OSMF could not be connected from browser.
Problem conclusion
After update Java 8.0_64 to SR4 FP5 or FP6. z/OSMF could not be connected from browser. No error messages are obvious. If Java is backed off to 8.0_64 SR4 FP2 or earlier maintenance level, z/OSMF could not be connected from browser. This issue caused and fixed by Java APAR PI84229.
Temporary fix
Comments
APAR Information
APAR number
PI84402
Reported component name
Z/OSMF CORE
Reported component ID
5655S28SM
Reported release
210
Status
CLOSED DOC
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2017-07-13
Closed date
2017-07-19
Last modified date
2017-07-21
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
| SC27841900 | SA38065700 |
Fix information
Applicable component levels
[{"Business Unit":{"code":null,"label":null},"Product":{"code":"SG19O","label":"APARs - MVS environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"210","Edition":"","Line of Business":{"code":"","label":""}},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SG19M","label":"APARs - z\/OS environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"210","Edition":"","Line of Business":{"code":"","label":""}}]
Document Information
Modified date:
21 July 2017