Företaget Swisscom kommer att ändra sina TLS-protokoll och stöder inte längre osäkra TLS-versioner och kryptografiska processer. Förändringen kommer att äga rum den 29 oktober 2020 kl 22.00. Följande ändras:
- Inte längre stöd för TLS version 1.0
- Inte längre stöd för TLS version 1.1
- Inte längre stöd för följande TLS-version 1.2-kryptografi:
- AES256-GCM-SHA384
- AES256-SHA256
- AES256-SHA
- AES128-GCM-SHA256
- AES128-SHA256
- AES128-SHA
Kontrollera dina TLS-anslutningar till oss! Detta är den nya konfigurationen med de återstående stödda chiffren efter ändringen:
SUITE |
BITS |
PROT |
CIPHER |
MAC |
KEYX |
ECDHE-RSA-AES256-GCM-SHA384 |
256 |
TLS1.2 |
AES-GCM |
SHA384 |
ECDHE_RSA |
ECDHE-RSA-AES256-SHA384 |
256 |
TLS1.2 |
AES |
SHA384 |
ECDHE_RSA |
ECDHE-RSA-AES256-CBC-SHA |
256 |
TLS1.2 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES128-GCM-SHA256 |
128 |
TLS1.2 |
AES-GCM |
SHA256 |
ECDHE_RSA |
ECDHE-RSA-AES128-SHA256 |
128 |
TLS1.2 |
AES |
SHA256 |
ECDHE_RSA |
ECDHE-RSA-AES128-CBC-SHA |
128 |
TLS1.2 |
AES |
SHA |
ECDHE_RSA |
Der Vollständigkeit nach ist dies die aktuelle List der Verschlüsselungssammlungen, die mit dem entsprechenden Protokoll aktiviert sind:
SUITE |
BITS |
PROT |
CIPHER |
MAC |
KEYX |
ECDHE-RSA-AES256-GCM-SHA384 |
256 |
TLS1.2 |
AES-GCM |
SHA384 |
ECDHE_RSA |
ECDHE-RSA-AES256-SHA384 |
256 |
TLS1.2 |
AES |
SHA384 |
ECDHE_RSA |
ECDHE-RSA-AES256-CBC-SHA |
256 |
TLS1 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES256-CBC-SHA |
256 |
TLS1.1 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES256-CBC-SHA |
256 |
TLS1.2 |
AES |
SHA |
ECDHE_RSA |
AES256-GCM-SHA384 |
256 |
TLS1.2 |
AES-GCM |
SHA384 |
RSA |
AES256-SHA256 |
256 |
TLS1.2 |
AES |
SHA256 |
RSA |
AES256-SHA |
256 |
TLS1 |
AES |
SHA |
RSA |
AES256-SHA |
256 |
TLS1.1 |
AES |
SHA |
RSA |
AES256-SHA |
256 |
TLS1.2 |
AES |
SHA |
RSA |
AES256-SHA |
256 |
DTLS1 |
AES |
SHA |
RSA |
ECDHE-RSA-AES128-GCM-SHA256 |
128 |
TLS1.2 |
AES-GCM |
SHA256 |
ECDHE_RSA |
ECDHE-RSA-AES128-SHA256 |
128 |
TLS1.2 |
AES |
SHA256 |
ECDHE_RSA |
ECDHE-RSA-AES128-CBC-SHA |
128 |
TLS1 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES128-CBC-SHA |
128 |
TLS1.1 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES128-CBC-SHA |
128 |
TLS1.2 |
AES |
SHA |
ECDHE_RSA |
AES128-GCM-SHA256 |
128 |
TLS1.2 |
AES-GCM |
SHA256 |
RSA |
AES128-SHA256 |
128 |
TLS1.2 |
AES |
SHA256 |
RSA |
AES128-SHA |
128 |
TLS1 |
AES |
SHA |
RSA |
AES128-SHA |
128 |
TLS1.1 |
AES |
SHA |
RSA |
AES128-SHA |
128 |
TLS1.2 |
AES |
SHA |
RSA |
AES128-SHA |
128 |
DTLS1 |
AES |
|
Dessa sviter kommer att tas bort:
SUITE |
BITS |
PROT |
CIPHER |
MAC |
KEYX |
ECDHE-RSA-AES256-CBC-SHA |
256 |
TLS1 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES256-CBC-SHA |
256 |
TLS1.1 |
AES |
SHA |
ECDHE_RSA |
AES256-GCM-SHA384 |
256 |
TLS1.2 |
AES-GCM |
SHA384 |
RSA |
AES256-SHA256 |
256 |
TLS1.2 |
AES |
SHA256 |
RSA |
AES256-SHA |
256 |
TLS1 |
AES |
SHA |
RSA |
AES256-SHA |
256 |
TLS1.1 |
AES |
SHA |
RSA |
AES256-SHA |
256 |
TLS1.2 |
AES |
SHA |
RSA |
AES256-SHA |
256 |
DTLS1 |
AES |
SHA |
RSA |
ECDHE-RSA-AES128-CBC-SHA |
128 |
TLS1 |
AES |
SHA |
ECDHE_RSA |
ECDHE-RSA-AES128-CBC-SHA |
128 |
TLS1.1 |
AES |
SHA |
ECDHE_RSA |
AES128-GCM-SHA256 |
128 |
TLS1.2 |
AES-GCM |
SHA256 |
RSA |
AES128-SHA256 |
128 |
TLS1.2 |
AES |
SHA256 |
RSA |
AES128-SHA |
128 |
TLS1 |
AES |
SHA |
RSA |
AES128-SHA |
128 |
TLS1.1 |
AES |
SHA |
RSA |
AES128-SHA |
128 |
TLS1.2 |
AES |
SHA |
RSA |
AES128-SHA |
128 |
DTLS1 |
AES |