IBM MQ v9.3.0.10 Fix Pack Released

IBM has just released IBM MQ v9.3.0.10 Fix Pack:
https://www.ibm.com/support/pages/downloading-ibm-mq-93010-fix-pack

Regards,
Roger Lacroix
Capitalware Inc.

Fix Packs for MQ, IBM i (OS/400), IBM MQ, IBM MQ Appliance, Linux, Unix, Windows Comments Off on IBM MQ v9.3.0.10 Fix Pack Released

IBM MQ 9.2.0.16 LTS CSU Released

IBM has just released IBM MQ 9.2.0.16 LTS CSU:
https://www.ibm.com/support/pages/downloading-ibm-mq-92016-lts-csu

Regards,
Roger Lacroix
Capitalware Inc.

Fix Packs for MQ, IBM i (OS/400), IBM MQ, IBM MQ Appliance, Linux, Unix, Windows Comments Off on IBM MQ 9.2.0.16 LTS CSU Released

IBM MQ v9.1.0.17 Fix Pack Released

IBM has just released IBM MQ v9.1.0.17 Fix Pack:
https://www.ibm.com/support/pages/downloading-ibm-mq-91017-lts-csu

Regards,
Roger Lacroix
Capitalware Inc.

Fix Packs for MQ, IBM i (OS/400), IBM MQ, IBM MQ Appliance, Linux, Unix, Windows Comments Off on IBM MQ v9.1.0.17 Fix Pack Released

IBM MQ Cumulative Security Update 8.1.0.16 for HP NonStop Server Released

IBM has just released Cumulative Security Update 8.1.0.16 for IBM MQ for HP NonStop Server:
https://www.ibm.com/support/pages/node/879471

Regards,
Roger Lacroix
Capitalware Inc.

Fix Packs for MQ, HPE NonStop, IBM MQ Comments Off on IBM MQ Cumulative Security Update 8.1.0.16 for HP NonStop Server Released

IBM MQ End of Service Dates

So, what version of IBM MQ (aka WebSphere MQ & MQSeries) are you running? Are you behind in upgrading your release of MQ?

Everybody “should be” running IBM MQ v9.2 or v9.3, if you want support from IBM.

In case it has slipped your mind, here is a list of IBM MQ releases and there end of service dates:

Note: IBM v9.2 and v9.3 do not yet have end of service dates.

Regards,
Roger Lacroix
Capitalware Inc.

IBM i (OS/400), IBM MQ, IBM MQ Appliance, Linux, Unix, Windows, z/OS Comments Off on IBM MQ End of Service Dates

IBM MQ 9.2.0.15 Fix Pack Released

IBM has just released IBM MQ 9.2.0.15 Fix Pack:
https://www.ibm.com/support/pages/downloading-ibm-mq-92015-fix-pack

Regards,
Roger Lacroix
Capitalware Inc.

Fix Packs for MQ, IBM i (OS/400), IBM MQ, IBM MQ Appliance, Linux, Unix, Windows Comments Off on IBM MQ 9.2.0.15 Fix Pack Released

IBM MQ v9.3.0.6 LTS CSU Released

IBM has just released IBM MQ v9.3.0.6 LTS CSU:
https://www.ibm.com/support/pages/node/7007719

Regards,
Roger Lacroix
Capitalware Inc.

Fix Packs for MQ, IBM i (OS/400), IBM MQ, IBM MQ Appliance, Linux, Unix, Windows Comments Off on IBM MQ v9.3.0.6 LTS CSU Released

IBM MQ V9.3.3 Announced

IBM has announced IBM MQ V9.3.3:
https://community.ibm.com/community/user/integration/blogs/ian-harwood1/2023/06/21/mq933ga

Highlights:

  • – IBM MQ Appliance SSH certificate authentication
  • – IBM MQ Appliance disk usage notifications
  • – XMS and .NET client enhancements
  • – Use the MQ messaging REST API to send messages to a remote queue manager
  • – IBM MQ Console enhancements
  • – Unlocking events from mission-critical data using Kafka Connect
  • – Additional SMF queue statistics records for MQ for z/OS
  • – Automatic recovery of damaged objects for Native HA queue managers
  • IBM MQ (aka WebSphere MQ) homepage
    https://www.ibm.com/products/mq

    Regards,
    Roger Lacroix
    Capitalware Inc.

    Fix Packs for MQ, IBM MQ, IBM MQ Appliance, Linux, Unix, Windows, z/OS Comments Off on IBM MQ V9.3.3 Announced

    IBM MQ Fix Pack 8.1.0.15 for HP NonStop Server Released

    IBM has just released Fix Pack 8.1.0.15 for IBM MQ for HP NonStop Server:
    https://www.ibm.com/support/pages/ibm-mq-hp-nonstop-server-81-fix-pack-81015

    Regards,
    Roger Lacroix
    Capitalware Inc.

    Fix Packs for MQ, HPE NonStop, IBM MQ Comments Off on IBM MQ Fix Pack 8.1.0.15 for HP NonStop Server Released

    List Ciphers used by JVM

    On StackOverflow, someone was having an issue with a particular CipherSuite. So, I posted a sample Java code that I found a while ago to list the ciphers used by a JVM.

    I found the Java code on Atlassian Support’s page here.

    The purpose of the code sample is to allow the user to determine if the CipherSuite they are using is actually supported by the JVM.

    I updated the code to include the JVM version and vendor name. Here is the updated code:

    import java.util.Iterator;
    import java.util.Map;
    import java.util.TreeMap;
    import javax.net.ssl.SSLServerSocketFactory;
    
    public class Ciphers
    {
        public static void main(String[] args)
            throws Exception
        {
            System.out.println("Running under Java " + System.getProperty("java.version")
                                + " from " + System.getProperty("java.vendor"));
            SSLServerSocketFactory ssf = (SSLServerSocketFactory)SSLServerSocketFactory.getDefault();
    
            String[] defaultCiphers = ssf.getDefaultCipherSuites();
            String[] availableCiphers = ssf.getSupportedCipherSuites();
    
            TreeMap<String, Boolean> ciphers = new TreeMap<String, Boolean>();
    
            for(int i=0; i<availableCiphers.length; ++i )
                ciphers.put(availableCiphers[i], Boolean.FALSE);
    
            for(int i=0; i<defaultCiphers.length; ++i )
                ciphers.put(defaultCiphers[i], Boolean.TRUE);
    
            System.out.println("Default\tCipher");
            for(Iterator i = ciphers.entrySet().iterator(); i.hasNext(); ) {
                Map.Entry cipher=(Map.Entry)i.next();
    
                if(Boolean.TRUE.equals(cipher.getValue()))
                    System.out.print('*');
                else
                    System.out.print(' ');
    
                System.out.print('\t');
                System.out.println(cipher.getKey());
            }
        }
    }

    Here is the output from running it against IBM v1.8 JVM:

    Running under Java 1.8.0_341 from IBM Corporation
    Default	Cipher
    *	SSL_DHE_DSS_WITH_AES_128_CBC_SHA
    *	SSL_DHE_DSS_WITH_AES_128_CBC_SHA256
    *	SSL_DHE_DSS_WITH_AES_128_GCM_SHA256
    *	SSL_DHE_DSS_WITH_AES_256_CBC_SHA
    *	SSL_DHE_DSS_WITH_AES_256_CBC_SHA256
    *	SSL_DHE_DSS_WITH_AES_256_GCM_SHA384
    *	SSL_DHE_RSA_WITH_AES_128_CBC_SHA
    *	SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
    *	SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
    *	SSL_DHE_RSA_WITH_AES_256_CBC_SHA
    *	SSL_DHE_RSA_WITH_AES_256_CBC_SHA256
    *	SSL_DHE_RSA_WITH_AES_256_GCM_SHA384
    *	SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
    *	SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
    *	SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
    *	SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
    *	SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
    *	SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
    *	SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA
    *	SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256
    *	SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256
    *	SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA
    *	SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384
    *	SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
    *	SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA
    *	SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
    *	SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
    *	SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA
    *	SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
    *	SSL_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
    *	SSL_ECDH_RSA_WITH_AES_128_CBC_SHA
    *	SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256
    *	SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256
    *	SSL_ECDH_RSA_WITH_AES_256_CBC_SHA
    *	SSL_ECDH_RSA_WITH_AES_256_CBC_SHA384
    *	SSL_ECDH_RSA_WITH_AES_256_GCM_SHA384
    *	SSL_RSA_WITH_AES_128_CBC_SHA
    *	SSL_RSA_WITH_AES_128_CBC_SHA256
    *	SSL_RSA_WITH_AES_128_GCM_SHA256
    *	SSL_RSA_WITH_AES_256_CBC_SHA
    *	SSL_RSA_WITH_AES_256_CBC_SHA256
    *	SSL_RSA_WITH_AES_256_GCM_SHA384
    *	TLS_AES_128_GCM_SHA256
    *	TLS_AES_256_GCM_SHA384
    *	TLS_CHACHA20_POLY1305_SHA256
     	TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
     	TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
     	TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
    *	TLS_EMPTY_RENEGOTIATION_INFO_SCSV

    Here is the output from running it against Oracle v17 JVM:

    Running under Java 17.0.7 from Oracle Corporation
    Default	Cipher
    *	TLS_AES_128_GCM_SHA256
    *	TLS_AES_256_GCM_SHA384
    *	TLS_CHACHA20_POLY1305_SHA256
    *	TLS_DHE_DSS_WITH_AES_128_CBC_SHA
    *	TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
    *	TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
    *	TLS_DHE_DSS_WITH_AES_256_CBC_SHA
    *	TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
    *	TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
    *	TLS_DHE_RSA_WITH_AES_128_CBC_SHA
    *	TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
    *	TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
    *	TLS_DHE_RSA_WITH_AES_256_CBC_SHA
    *	TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
    *	TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
    *	TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
    *	TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
    *	TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
    *	TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
    *	TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
    *	TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
    *	TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
    *	TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
    *	TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
    *	TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
    *	TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
    *	TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
    *	TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
    *	TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
    *	TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
    *	TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
    *	TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
    *	TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
    *	TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
    *	TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
    *	TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
    *	TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
    *	TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
    *	TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
    *	TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
    *	TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
    *	TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
    *	TLS_EMPTY_RENEGOTIATION_INFO_SCSV
    *	TLS_RSA_WITH_AES_128_CBC_SHA
    *	TLS_RSA_WITH_AES_128_CBC_SHA256
    *	TLS_RSA_WITH_AES_128_GCM_SHA256
    *	TLS_RSA_WITH_AES_256_CBC_SHA
    *	TLS_RSA_WITH_AES_256_CBC_SHA256
    *	TLS_RSA_WITH_AES_256_GCM_SHA384

    Regards,
    Roger Lacroix
    Capitalware Inc.

    Education, IBM i (OS/400), IBM MQ, IBM MQ Appliance, Java, Linux, macOS (Mac OS X), Programming, Security, Unix, Windows Comments Off on List Ciphers used by JVM