Inbound Connections from Vendors or Partners
Weak Ciphers May Fail or Be Rejected
boberdoo systems require the use of modern connection protocols and strong ciphers to establish the most secure connection with third parties and maintain compliance with various standards and best practices such as PCI-DSS. Certain ciphers using CBC (Cipher Block Chaining) modes have been exploited in known vulnerabilities and should not be used in practice.
Unsupported Cipher Suites
The following TLS cipher suites are considered to be weak and are no longer supported by boberdoo: ECDHE-RSA-AES128-SHA256 and ECDHE-RSA-AES256-SHA384.
Recommended Action
It is recommended that vendors/partners update their server configurations to select only the strongest cipher suites available during connection negotiation.
Additional Resources
Example of how to identify and correct cipher suite issues: Weak TLS cipher suites (linkedin.com)
Ready To Get Started?
Fill out the form below to schedule a demo with one of our lead distribution experts.