Skip to Main Content
IBM Sterling

This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.

Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal ( - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal ( - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM. - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Categories Security
Created by Guest
Created on Aug 19, 2019

Make the version info in the banner of the CLI commands (direct, ndmcli, ...) & GUIs consult a file in the install tree

We have received several security findings because CD gives version details that will allow hackers info on how to hack the software.

What is your industry? Banking
How will this idea be used?

We would edit the version file with "IBM(R) Sterling Connect:Direct(R) for UNIX "

  • Admin
    Chris Sanders
    Mar 20, 2020

    Thank you very much for including that additional information. We've discussed this further internally, but don't believe that we'll be able to focus resources on this change in the short to medium term.

    While I understand your explanation we feel that anyone who is granted access to one of these systems should also have basic information available about the system that they are logging into. There are also other ways that a user could view the version information as well which could not be blocked in a reasonable fashion. Those points as well as a lack of broader market interest make it unlikely that we'd be able to focus on this within a reasonable amount of time so this will be declined.

    I do want to thank you very much for using the enhancement request tool and would encourage you to utilize it again if you uncover other ideas that we should consider.


    Chris Sanders

    Connect:Direct Offering Manager

  • Guest
    Sep 3, 2019


    Multiple security frame works(PCI-DSS, OWASP, etc.) discuss altering software banners to not provide version data to a potential hacker. By placing the banner in a file external to the executable, then administrator of a Connect:Direct install can customize the banner to show legal messages, remove version info, display help phone numbers, etc.

    Indeed as you mention this should only be accessible to users that have access, however, many of the most damaging penetrations of enterprise systems arise from internal actors or valid accounts that have been compromised. Please consider this enhancement as a way to allow your customers to meet this requirement. By comparison understand that sFTP provides this capability.


  • Admin
    Chris Sanders
    Aug 30, 2019

    Thank you for opening this enhancement request with IBM. I have reviewed it thoroughly with my team and we aren't quite sure we understand the security implications that you've mentioned.

    The C:D CLI should only be accessible by users that have permissions to interact with C:D. We would expect that these users should know the version/maintenance that is being used as they would have access to perform other tasks such as submitting processes, checking the status of transfers, potentially making configuration changes, etc. If we have overlooked a specific reason that you believe this causes security concerns I'd be happy to review further however.


    Chris Sanders

    Connect:Direct Offering Manager