Inbound connections from vendors or partners attempting to use weak ciphers may fail or be rejected
- boberdoo systems require the use of modern connection protocols and strong ciphers to establish the most secure connection with third parties and maintain compliance with various standards and best practices such as PCI-DSS. Certain ciphers using CBC (Cipher Block Chaining) modes have been exploited in known vulnerabilities and should not be used in practice.
- The following TLS cipher suites are considered to be weak and are no longer supported by boberdoo: ECDHE-RSA-AES128-SHA256 and ECDHE-RSA-AES256-SHA384.
- It is recommended that vendors/partners update their server configurations to select only the strongest cipher suites available during connection negotiation.
Example of how to identify and correct cipher suite issues: Weak TLS cipher suites (linkedin.com)