IBM Support

IT33247: SUPPRESS AUTOMATIC GENERATION OF SSH DSA KEYS

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • In recent penetration test, DataPower would be flagged with
    using 1024-bit DSA host-keys which is being too small.
    This is due to newer SSH specification which has deprecated DSA.
    

Local fix

  • Disabling DSA in the user's administrative SSH clients would
    mitigate this issue.
    

Problem summary

  • The device will no longer automatically generate DSA keys;
    existing keys will continue to function and new keys can be
    generated if explicitly called.
    

Problem conclusion

Temporary fix

Comments

APAR Information

  • APAR number

    IT33247

  • Reported component name

    DATAPOWER

  • Reported component ID

    DP1234567

  • Reported release

    18X

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2020-06-17

  • Closed date

    2020-08-23

  • Last modified date

    2020-08-27

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    DATAPOWER

  • Fixed component ID

    DP1234567

Applicable component levels

  • R18X PSY

       UP

  • RA0X PSY

       UP

[{"Line of Business":{"code":"LOB45","label":"Automation"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SS9H2Y","label":"IBM DataPower Gateways"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"18X"}]

Document Information

Modified date:
25 August 2021