News for current customers

Important news for IBM Systems cryptographic hardware products

News

The table below contains important news about the IBM Systems cryptographic hardware products. Customers are encouraged to visit this page frequently.


Date

Product

Description

Oct. 4, 2017     |     HSM CEX5S     |     Update to EP11 support for Linux on z Systems

Sep. 8, 2017     |     HSM CEX6C     |     CCA Releases 5.2, 5.0 for CEX6C Toleration support for Linux on zSystems

Jan. 24, 2017     |     HSM 4767     |     CCA - support for RHEL Server 7.3

Nov. 18, 2016     |     FC EJ32/FC EJ33     |     CCA support for IBM Power Systems

As of November 2016, CCA Release 5.3.12 includes support for IBM Power Systems with any of the following operating systems installed:

  • IBM AIX (7.2, 7.1, and 6.1, 32-bit or 64-bit)
  • IBM i (7.2, Technology Refresh 5, 32-bit and 64-bit)
  • PowerLinux
    • RHEL Server 7.3 and RHEL Server 7.2, 64-bit
    • SLES 12 Service Pack 2 (little endian), 64-bit.
    • Ubuntu by Canonical, 16.04.1

Nov. 10, 2016     |     HSM 4767     |     Fix for memory leak

Problem: A host memory leak can occur.

Users affected: Users of CCA host Release 5.3.12 (Linux or Windows) or CCA host Release 5.2.23 (Linux only) who call the Symmetric_Algorithm_Decipher (CSNBSAD) verb with the Galois/Counter Mode (GCM) processing rule specified in the rule array are affected.

Problem fix: A fix package for the CCA host library of the IBM 4767 PCIe Cryptographic Coprocessor CCA Support Program is available:

Recommendation: All affected users should apply the applicable fix package.

Sept. 27, 2016     |     HSM 4767     |     New CCA release 5.3.12

An update to IBM 4767 CCA Support Program Release 5.3.12 has been released to include support on Linux. Release 5.3.12 for CCA is supported on the following 64-bit operating systems:

  • Microsoft Windows Server 2012 R2
  • Red Hat Enterprise Linux (RHEL) Server (64-bit)
  • SUSE Linux Enterprise Server (SLES) from Novell (64-bit)

Attention Windows users:

Aug. 30, 2016     |     HSM 4767     |     New CCA Release 5.3.12 for Windows

  • Microsoft Windows Server 2012 R2, 64-bit

Summary of changes for Release 5.3.12

The initial release of CCA for the IBM 4767 is Release 5.2.23. Release 5.3.12 is the first release available after the initial release of the IBM 4767, and is the first release available that is supported on Microsoft Windows operating system (64-bit).

In addition to being supported on Windows, Release 5.3.12 provides support for the following enhancements:

The addition of support for the PKCS #1 v2.2 RSA Probabilistic Signature Scheme (RSA-PSS). RSA-PSS is based on the RSA cryptosystem and provides increased security assurance:

  • Digital_Signature_Generate
    • - New digital-signature hash formatting method rule-array keyword PKCS-PSS
    • - The addition of the SHA-224 hashing-method specification rule-array keyword.
  • Digital_Signature_Verify
    • - New digital-signature hash formatting method rule-array keyword PKCS-PSS.
    • - New signature checking rule rule-array keyword group, with keywords EXMATCH and NEXMATCH, and related new required command Allow Not Exact Salt Length (offset X'033B').

The addition of digital signature support to optionally process the text supplied in the data variable (formerly hash variable) as a message that is to be hashed using the specified hashing-method:

  • Digital_Signature_Generate
    • - New input type rule-array keyword group, with keywords HASH and MESSAGE.
  • Digital_Signature_Verify
    • - New input type rule-array keyword group, with keywords HASH and MESSAGE
    • - New hashing-method specification rule-array keyword group, with keywords MD5, RPMD-160, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512.
    • - The addition of format restrictions for PKA private key tokens of type RSA-AESC (token version X'31') and RSA-AESM (X'30') to optionally restrict these private keys to a particular digital-signature hash formatting method, or not restrict them (the default). Options include ISO-9796, PKCS-1.0, PKCS-1.1, PKCS-PSS, X9.31, or ZERO-PAD.
  • PKA_Key_Token_Build and PKA_Key_Translate New rule array keyword format restriction group, including keywords FR-I9796, FR-NONE, FR-PK10, FR-PK11, FR-PSS, FR-X9.31, and FR-ZPAD.
  • Addition of key token definitions for format restriction for digital-signature hash-formatting method, offset 51, in RSA private key RSA private key sections X'30' and X'31' (4096-bit M-E format and CRT format, with AES-encrypted OPK section).

Apr. 26, 2016     |     HSM 4767     |     New IBM 4767 and CCA release 5.2

What's new:

In addition to the functions available on the HSM 4765, the PCIeCC2 has the following:

  • Increased performance.
  • Hardware accelerated Elliptic Curve Cryptography (ECC) key generation, along with digital signature generation and verification using the Elliptic Curve Digital Signature Algorithm (ECDSA).
  • Enhanced firmware load security using ECDSA signatures.
  • Support for Visa Data Secure Platform with Point to Point Encryption (VDSP with P2PE), which includes Visa Format-Preserving Encryption (FPE).
  • Access-control tracking can be performed on a role ID basis to gather information about which access control points are queried by applications. Users of the IBM 4767 have enhanced logon control capabilities, including stricter passphrase length and character requirements and the ability for users to change their own passphrases.
  • The ability to encipher and decipher data using the AES algorithm in Galois/Counter Mode (GCM).
  • The creation of symmetric key material from a pair of Elliptic Curve Cryptography (ECC) keys using the Elliptic Curve Diffie-Hellman (ECDH) protocol and the ANSI-9.63-KDF key derivation method as specified in ANSI X9.63-2011.
  • Newly selectable RSA public exponents 5, 17, and 257. This addition completes the series of the first five Fermat numbers. The first five Fermat numbers are known to be prime.

Oct. 2015     |     HSM 4767     |     New product release for IBM 4765

Jul. 2015     |     HSM CEX5S     |     New product release of CCA for Linux on z Systems

Apr. 2015     |     FC EJ27 / FC EJ28 / FC EJ29 / HSM 4765     |     Buffer overflow in the GNU C library affects CCA customers

Problem: A buffer overflow vulnerability in the GNU C library (glibc) has been publicly disclosed by Qualys.

Users affected:

  • System x CCA and Toolkit users running CCA release 4.1, 4.2, 4.3, 4.4.16, or 4.4.20.
  • System p AIX CCA and Toolkit users running CCA 4.3.8 or 4.4.20.

Note: The base PCIe Cryptographic Coprocessor (CCA) is not susceptible to the two known security issues described below. Only Toolkit customers may be susceptible. However, as a consumer of the GNU C Library (glibc), IBM is making a patch available for System x 4765 and System p PCIe Cryptographic Coprocessor users. Toolkit customers should download and install the fix and contact their Toolkit provider if there are any questions.

As of April 2015, a patch is available for System x 4765 and System p PCIe Cryptographic Coprocessor users who have used a Toolkit to develop a firmware application that uses (1) the network port, or (2) the gethostbyname() or gethostbyname2() glibc functions. If you are one of these users, you may be exposed to the following reported security vulnerability:

GHOST: glibc gethostbyname buffer overflow vulnerability (CVE-2015-0235)

Description: A heap-based buffer overflow exists in the GNU C library, commonly known as glibc. The affected library component is the ss_hostname_digits_dots() function used by both gethostbyname() and gethostbyname2() glibc functions. Programs calling these functions may be vulnerable to a buffer overflow, exploitable by local, as well as remote users, to execute arbitrary code on affected systems. In-depth technical information on the vulnerability has been publicly released and includes exploit, mitigation, and patch information. While not yet publicly available, a proof-of-concept remote exploit has been developed using this vulnerability that Qualys plans on publishing.

The GNU C library is most commonly used in systems using the Linux kernel.

CVE-2015-0235 has a Base CVSS score of 6.8 (medium)

CCA and Toolkit users: The GNU C library is shipped with the 4765 base support. The base card is not susceptible to these issues because the card is not shipped with the network port enabled, and there is no auto-config script to set up a network or ethernet device. Also, the card does not use the gethostbyname() nor gethostbyname2() glibc functions. IBM is providing the fix because the 4765 coprocessor is a consumer of the GNU C library. Applying this security patch is left to your discretion. To install the patch, see the instructions below. CCA customers should contact crypto@us.ibm.com with questions.

Toolkit users only: If your firmware application for the IBM 4765 uses the affected GNU C library functions or enables the network port, apply the security patch which corrects the vulnerability. Contact your Toolkit provider with questions.

To install the patch:

System x users:

  1. System x users of CCA Release 4.1 must move up to CCA Release 4.2 or later before applying the patch.
  2. Download the file  which contains a README.txt file and CLU files that contain the the patch.
  3. Untar the downloaded file.
  4. Follow the directions provided in the README.txt file to install the patch.

System p AIX users:

  1. Download the file that contains an interim fix.
  2. Install the interim fix using this command:
    emgr -X -e 4765FW4428.150326.epkg.Z
  3. Follow the directions provided in the README file:
    /usr/lpp/csufx.4765/README.4765FW4428

Benefits:

Installing the ghost vulnerability security patch corrects the security vulnerability described above.

Mar. 14, 2014     |     PCIeCC2 and PCIeCC     |     Government access to data

Feb. 19, 2013     |    HSM 4765     |     MEPS validation

As of February 19, 2013, the 4765 hardware security module (HSM) is validated to meet the MEPS (Méthode d'Évaluation des Produits Securitaire "bancaires") approval scheme used by Cartes Bancaires (CB) banking ecosystem. This standards certification allows the 4765 HSM to be used by CB member banks on their dedicated payment networks.

Mar. 2012     |     HSM 4765     |     Support additional operating systems