Changing security protocol levels
Security administrators can change the security protocol level for either SSL or SSH protocols. When you change the security level for either of these security protocols, you can control which encryption algorithms, ciphers, and version of the protocol are permitted on the system.
Depending on your security requirements for your organization or geography, you can change the level for both SSL and SSH protocols.
The system supports OpenSSL and Java SSL ciphers to provide strong encryption for secure connections using the SSL or TLS protocols. On new systems, the default SSL protocol level is 1 and the default SSH protocol level is 1; however you can change the SSL protocol level at any time to resolve errors or further restrict the protocol versions and ciphers that can be used for encryption.
The following table describes each security level, minimum version of SSL allowed and the supported ciphers for each level:
| Security level | Description | Minimum security allowed |
|---|---|---|
| 1 | Sets the system to disallow SSL version 3.0. | TLS 1.0 |
| 2 | Sets the system to disallow SSL version 3.0, TLS version 1.0, and TLS version 1.1. | TLS 1.2 |
| 3 | Sets the system to disallow SSL version 3.0, TLS version 1.0, and TLS version 1.1 and to allow cipher suites that are exclusive to TLS version 1.2. | TLS 1.2 |
| 4 | Sets the system to disallow SSL version 3.0, TLS version 1.0, and TLS version 1.1 and to allow cipher suites that are exclusive to TLS version 1.2. Sets the system to disallow RSA key exchange ciphers, RSA ciphers for SSH. | TLS 1.2 |
The following table describes the SSH security levels supported by the system:
| Security level | Key Exchange | Cipher Suite | MAC Algorithm |
|---|---|---|---|
| 1 |
|
aes256-ctr aes192-ctr aes128-ctr chacha20-poly1305@openssh.com aes256-gcm@openssh.com aes128-gcm@openssh.com aes256-cbc aes192-cbc aes128-cbc |
hmac-sha2-256 hmac-sha2-512 hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1 |
| 2 |
|
aes256-ctr aes192-ctr aes128-ctr chacha20-poly1305@openssh.com aes256-gcm@openssh.com aes128-gcm@openssh.com |
hmac-sha2-256 hmac-sha2-512 hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1 |
When you change the SSL security protocol level, you must restart any service using SSL/TLS. All current session are ended to ensure no sessions are open using the old security level. It can take a few minutes for the service to be available.
Using the command-line interface (CLI)
The chsecurity command allows you to set the ciphers and protocols that are
allowed by secure interfaces to reduce the vulnerability to attack. However, changing the security
level might break the connection to external systems such as web browsers and anything that is
connected through CIM such as VMWare provisioning utilities or IBM® Spectrum Control software.