This page was last edited on September 30, 2022, at 13:08.
Comments or questions about this documentation? Contact us for support!
Configuration Server Release Notes
Release Date | Release Type | Restrictions | AIX | Linux | Mac | Solaris | Windows |
---|---|---|---|---|---|---|---|
09/30/22 | General | X | X |
This release contains the following new features and enhancements:
This release contains the following resolved issues:
CS now uses OAEP padding when encrypting the configuration database password that is stored in the CS startup configuration file of the master Configuration Server. Previously, CS used the PKCS 1 padding instead of OAEP. This change enhances the security in storing the password by eliminating the known vulnerability of PKCS 1 padding. You can use the existing configuration files containing passwords, encrypted with PKCS 1, with no changes. You can update the configuration files to re-encrypt the password using OAEP. For information on how to do this, refer to the section Encrypting the Configuration Database Password of the Management Framework Deployment Guide.
The new startup option in the configuration file Configuration Server Section is automatically created when CS is forced to encrypt the database password.
ecryption-padding
Valid Value: OAEP - password is encrypted using OAEP padding
Default: If the password is encrypted, PKCS 1 padding is used
Changes Take Effect: After restart
(MFWK-24175)
No special procedure is required to upgrade to release 8.5.101.97.