If Java-based client applications connecting to DCM-secured IBM servers
(e.g., Secured Telnet) start refusing (typically after a Java update) to
establish secured connections, with the somewhat ungrammatical error,
java.security.cert.CertificateException: Certificates does not
conform to algorithm constraints
you need to go into DCM and update your certificate(s) on the affected 
server(s), and (if they came out of the internal CA) probably its 
certificate as well. These are the instructions for a V6 box.
Start by going into DCM.
If the affected certificates came from your Internal CA, then start 
there. Click <Select a Certificate Store>, select "Local Certificate 
Authority," and click <Continue>. Enter the password for the CA, and 
click <Continue> again.
A "Manage Local CA" group will appear in the sidebar. Click "View." Look 
for the key length. It should be at least 2048. If it's less than 2048, 
the newest JVMs are going to turn up their noses at it.
If it's not at least 2048, click "Renew." You will probably need to 
manually change the key size to 2048 or more (top of the form), and you 
might also want to set a nice generous validity period (bottom of the form).
Once you've renewed the certificate, it will give you an opportunity to 
export your CA certificate, if any of your client boxes need copies of 
it. If your clients are only using the certificate for privacy, they 
might not care. And you can always export it later.
Once you have a local CA with keylength >= 2048, click <Select a 
Certificate Store> again, and this time go into the SYSTEM certificate 
store. Note that once you're in, the "Manage Local CA" group changes to 
"Manage Certificates." You can either click "Create Certificate" (in its 
own group, at the top of the sidebar), or "Renew Certificate" (in the 
Manage Certificates" group.
For "Create Certificate," select "Server Certificate," and click 
<Continue>. Select "Local Certificate Authority," and click <Continue>. 
You'll be presented with a blank form in which to enter the parameters. 
BE SURE TO MANUALLY SET THE KEYSIZE TO >= 2048!
For "Renew Certificate," select the existing certificate you wish to 
renew, and click <Continue>.  Select "Local Certificate Authority," and 
click <Continue>. You'll be presented with a form in which most of the 
parameters are taken from the existing certificate. Enter a new 
certificate label, and BE SURE TO MANUALLY SET THE KEYSIZE TO >= 2048!
For certificates signed by a public CA, you would skip the Local CA 
update, and when creating or renewing the certificate, you would select 
"VeriSign or other Internet Certificate Authority" instead of "Local 
Certificate Authority." This time, when you fill out the form, the 
response will be a CSR, which you will then need to submit to your CA.
Once you have your shiny new keylength >= 2048 certificate installed in 
your SYSTEM keystore, you may be taken directly to the "Assign 
Certificate" form; if not, then click "Assign Certificate." Select the 
application(s) to which you need to assign the certificate, and click 
<Continue>.
Then you will need to stop and restart the affected server(s). If you're 
restarting your Telnet server, make sure you do so from Systems 
Director, iNav, HMC, Lan Console, or an actual terminal, NOT from a 
Telnet session! Likewise, if you're restarting something that iNav 
depends on, do it from something other than iNav. And so forth. Don't 
saw off the limb you're sitting on.
--
James H. H. Lampert
As an Amazon Associate we earn from qualifying purchases.