Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Categories z/TPF
Created by Guest
Created on Jun 21, 2023

We would like digitally signed software downloads for the z/TPF Product Family

Enacting this policy (digitally signed software downloads) would save my team a lot of unnecessary paperwork.

Idea priority Medium
  • Guest
    Reply
    |
    Oct 3, 2023
    Based on resources and priorities, the z/TPF lab does not expect to implement this idea in the foreseeable future. The code signing implementation used by the client in the IBM supported solution does not support signing artifacts in a native Linux Z build environment (s390x). The z/TPF Product Family requires a solution for the s390x environment.
  • Guest
    Reply
    |
    Sep 27, 2023
    Discussion on a possible solution to this continues within the z/TPF lab. We expect to have further information within the next 2 weeks. Thank you for your patience.
  • Guest
    Reply
    |
    Sep 18, 2023

    May we have an update on this RFE?

  • Guest
    Reply
    |
    Sep 7, 2023

    The customer would like to be able download the “SW package” first, and then later be able to digitally verify it via some LINUX command using a CA signed cert provided by IBM. They don’t think the validation checking should be performed at the same time as when they download the SW, because if the IBM website is hacked, they would not know that the SW is compromised.

    z/OS already supports digitally signed SW downloads so they suggest that the zTPF lab can follow the z/OS’s lab lead?

  • Guest
    Reply
    |
    Aug 14, 2023
    Note: The IBM z/TPF lab would be limited to signing the archive of the source material that is delivered with an APAR. Given the nature of the product, the actual binaries are not built and shipped by IBM. We could sign the individual source files shipped with the APARs, however the understanding is that those source files can be (and are) modified by the client and the signature would no longer be verifiable. It is something we can do to blindly meet the requirement, but is limited to validating the archive you download from the private download site which requires authentication to access.

    Does the ability to perform a validation check on the IBM signed archive files you would download from the same secure private download site used today meet the requirements needed to no longer file for an exception?
  • Guest
    Reply
    |
    Jul 26, 2023

    Responding on behalf of the customer, here are their responses:

    1. Are you using the cosign utility today or would the TPF lab need to sign the tar in such a way to allow openssl to perform the validation step? I checked our Enterprise Architecture list of approved software, nothing came up for “cosign” or “code sign”. Seems like we would want to use OpenSSL on LINUX to validate the package instead.

    2. What are your algorithm requirements? AES256 would be good, or just follow industry directions to support “commonly approved and secure” cipher algorithms as time goes on. In general…IBM would use a private key to encrypt the message digest, we would decrypt it using a public key that was signed by a well known Certificate Authority.

    3. How many bytes of SHA are needed? SHA256 would be good, or just follow industry directions to support “commonly approved and secure” hashing algorithms as time goes on

  • Guest
    Reply
    |
    Jul 19, 2023
    Please provide the following information so we can proceed with the investigation on this idea. Thank you.

    Are you using the cosign utility today or would the TPF lab need to sign the tar in such a way to allow openssl to perform the validation step?
    What are your algorithm requirements?
    How many bytes of SHA are needed?

    https://pages.github.ibm.com/Supply-Chain-Security/AppSec-External-Docs/appsec/CodeSigningService/LocalSign/WhatDoYouWantToSign/freeformtgztar/