What Radoslaw said re TLS versions. But you mostly probably don't need to worry 
too much about it, unless you're writing an application that will manage the 
actual connection. In that case, the application has to tell System SSL (the 
z/OS TLS stack) what it wants/is willing to use. This is sort of sad in that in 
most cases you just want it to use the latest and greatest: if it's talking to 
a peer that can do TLSv1.3, hey, do that; if 1.4 comes along, use that! But 
that's how it mostly works.

OTOH if you use OpenSSL under the covers, *it's* smart enough to do the 
negotiation to the highest level that it knows about, so an upgrade to TLSv1.4 
(if/when it arrives) would be a matter of upgrading OpenSSL, not changing your 
code.

But it's still not clear here what you're trying to do. If it's JUST protecting 
the data in transit, then TLS is mostly good enough. I say "mostly" because 
with quantum computing maybe eventually possibly conceivably becoming real, a 
HNDL ("Harvest Now, Decrypt Later") attack becomes a concern. This is where an 
attacker records the TLS transaction and later, if Post-Quantum Cryptography is 
ever real, uses that to break it and extract the data. It also means that the 
entry and exit points of the TLS tunnel are rich targets.

The fact that you mention AES makes me think that HNDL is on your (or your 
customer's) radar, and they plan to protect the data before it enters the TLS 
pipe and decrypt it at the other end. That's wise: even though it's unclear 
that quantum will ever be real, if it did, this would make HNDL useless against 
that data. Well, useless assuming you have a decent way to exchange keys. 
That's always the challenge! Also, if you do this, those TLS entry/exit points 
lose all value as targets.

Eric Rossman's comments re quantum are of course trenchant. Once Post-Quantum 
Cryptography TLS algorithms are available (at both ends!) HNDL presumably 
becomes moot. OTOH, more layers is better, so AESing the data outside the 
tunnel would still be a good idea. Choose your AES modes carefully--there's 
probably no reason to use anything other than GCM for what you're talking 
about, though, again, the use case isn't 100% clear.

Can you elaborate on the real requirements some more?

-----Original Message-----
From: IBM Mainframe Discussion List <[email protected]> On Behalf Of 
Steve Estle
Sent: Friday, October 3, 2025 2:01 PM
To: [email protected]
Subject: Re: ZSeries Crypto Cards - Decision Table?

Thanks all, what have you found to be the best sources of information for such 
architecting / reference / decisions / howto given we are not interested in 
encrypting "data at rest" (at least not now) and only interested in encryption 
over Comm Srvr controlled links.  Is it strictly Comm Server 3.1 Doc or do you 
have other documentation that you feel is essential?   

You hit upon a key point on the asymmetric vs. symmetric key exchanges - not 
sure I understand why you say "go with TLS 1.3 - no reason not to"...  My 
understanding is some crypto algorithms are no longer valid in TLS 1.3 (in 
other words not a superset of TLS 1.2) but open to being educated on that?

Thanks,
Steve Estle
CDW

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to