IBM Support

PH56482:WebSphere WS-Security sample keystores are expired

Download


Downloadable File

File link File size File description

Abstract

The WS-Security sample keys and certificates that are shipped with WebSphere Application Server v855 and v9 expired on 8/7/2023 and 8/8/2023.

Download Description

PH56482 resolves the following problem:

ERROR DESCRIPTION:
The WS-Security sample keys and certificates that are shipped with WebSphere Application Server v855 and v9 expired on 8/7/2023 and 8/8/2023.

The following WS-Security sample keystore and certificate files are affected:
dsig-sender.ks
dsig-receiver.ks
enc-sender.ks
enc-receiver.ks
intca2.cer


An error like the following is logged when one of the expired keys or certificates is used:
CWWSS6521E: The Login failed because of an exception:
javax.security.auth.login.LoginException: com.ibm.wsspi.wssecurity.core.SoapSecurityException:
CWWSS5181E: The following certificate, which is owned by CN=SOAPRequester, OU=TRL, O=IBM, ST=Kanagawa, C=JP with the soaprequester alias from the
c:\was90517\WebSphere\AppServer\profiles\AppSrv01/etc/ws-security/samples/dsig-sender.ks keystore, has expired:
java.security.cert.CertificateExpiredException: NotAfter: Tue Aug 08 12:46:30 CDT 2023 ocurred while running action:
com.ibm.ws.wssecurity.handler.WSSecurityGeneratorHandler$2@10737d36
 
The signing certificates and encryption keys that are replaced by this interim fix are used in the JAX-WS and JAX-RPC Web Services Default Bindings for Web Services Security. They are provided for testing and example purposes only and should not be used on production systems.

If you are using the WS-Security sample keys or certificates in production, your services are at risk. See https://www.ibm.com/support/pages/node/7025379 for instructions for remediation.

LOCAL FIX:
See https://www.ibm.com/support/pages/node/7025379

PROBLEM SUMMARY

USERS AFFECTED:
All users of IBM WebSphere Application Server

RECOMMENDATION:
If you are using the keys and certificates in production, follow the instructions on https://www.ibm.com/support/pages/node/7025379. Otherwise, install a fix pack or interim fix that contains this APAR.

PROBLEM CONCLUSION:
The WS-Security sample keystores are replaced with new keystores with the same name. The new keystores have new keys and certificates that expire in 2080.

When this interim fix is installed installed, the keystores are updated in the following directory:
(WAS_HOME)/etc/ws-security/samples


The following files are replaced:
dsig-receiver.ks
dsig-sender.ks
enc-receiver.jceks
end-sender.jceks
intca2.cer
image-20231208152259-1 Since the keystores that are located in existing profiles might be updated after creation, the keystores in existing profiles are not replaced.  
To replace the keystores in a profile, you must copy the keystores from the (WAS_HOME)/etc/ws-security/samples directory to the following directory:
(PROFILE_ROOT)/etc/ws-security/samples
image-20231208152259-1 This interim fix does not replace the key store files in the profileTemplates directory.  Therefore, when new profiles are created, the new keystores are not used.  
If you want new profiles to use the new key stores, you must copy the keystores from the (WAS_HOME)/etc/ws-security/samples directory to the following directory:
(WAS_HOME)/profileTemplates/default/documents/etc/ws-security/samples
 
The fix for this APAR is targeted for inclusion in fix packs 8.5.5.25 and 9.0.5.18. For more information, see Recommended Updates for WebSphere Application Server: https://www.ibm.com/support/pages/node/715553

The signing certificates and encryption keys that are replaced by this interim fix are used in the JAX-WS and JAX-RPC Web Services Default Bindings for Web Services Security. They are provided for testing and example purposes only and should not be used on production systems.

If you are using the WS-Security sample keys or certificates in production, your services are at risk. See https://www.ibm.com/support/pages/node/7025379 for instructions for remediation.

Prerequisites

None

Download Package

 
IMPORTANT NOTE:
WebSphere Application Server and Liberty fix access requires S&S Entitlement beginning in 2021. Use properly registered IDs to download the fixes in this table. 

Signature file is provided along with interim fix. See Verifying WebSphere Application Server release packages and Verifying Liberty release packages.
DOWNLOAD RELEASE DATE SIZE(Bytes)

URL

9.0.0.0-WS-WASProd-IFPH56482 09 November 2023 266659 FC
8.5.5.13-WS-WASProd-IFPH56482 09 November 2023 244304 FC
Note: FC stands for Fix Central. Review the What is Fix Central (FC)? FAQs for more details.

Problems Solved

PH56482

On

Technical Support

Contact IBM Support at https://www.ibm.com/mysupport/ or 1-800-IBM-SERV (US only).

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Component":"General","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF012","label":"IBM i"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"8.5.5.13;8.5.5.14;8.5.5.15;8.5.5.16;8.5.5.17;8.5.5.18;8.5.5.19;8.5.5.20;8.5.5.21;8.5.5.22;8.5.5.23;8.5.5.24;9.0.0.0;9.0.0.1;9.0.0.10;9.0.0.11;9.0.0.2;9.0.0.3;9.0.0.4;9.0.0.5;9.0.0.6;9.0.0.7;9.0.0.8;9.0.0.9;9.0.5.0;9.0.5.1;9.0.5.10;9.0.5.11;9.0.5.12;9.0.5.13;9.0.5.14;9.0.5.15;9.0.5.16;9.0.5.17;9.0.5.2;9.0.5.3;9.0.5.4;9.0.5.5;9.0.5.6;9.0.5.7;9.0.5.8;9.0.5.9","Edition":"Base","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
08 December 2023

UID

ibm17074520