Caveats in Communications Broker Release 4.2.0

The following items provide key information about upgrading and downgrading with Oracle Enterprise Communications Broker Release 4.2.0:

Upgrade and Downgrade Caveats

Platform-Specific Downgrade Limitations

Do not attempt to downgrade Communications Broker to a release not supported by your platform. See the section Supported PlatformsSupported Platforms table for a matrix of platforms and supported releases.

Connection Failures with SSH/SFTP Clients

If you upgrade, and your older SSH or SFTP client stops working, check that the client supports the minimum ciphers required in the ssh-config element. The current default HMAC algorithm is hmac-sha2-256. The current key exchange algorithm is diffie-hellman-group14-sha256. If a verbose connection log of an SSH or SFTP client shows that it cannot agree on a cipher with the SBC, upgrade your client.

SSH Host Key Algorithms

Session Border Controller offers rsa-sha2-512 as the default host key algorithm. SSH clients that offer only a SHA1 hash algorithm, such as ssh-rsa, are not supported; your SSH client must offer a SHA2 hash algorithm. If you see an error message: "no matching host key type found", upgrade your SSH client to one that supports SHA2 host key algorithms.

Diffie-Hellman Key Size

For TLS negotiations on SIP interfaces, the default Diffie-Hellman key size offered by the Communications Broker is 1024 bits. The key size is set in the diffie-hellman-key-size attribute in the tls-global configuration element. Increasing the key size by setting the key size to 2048 bits significantly decreases performance.

Default TLS Version

Releases prior to Communications Broker Release 4.1.0, do not support TLS1.3. Release Communications Broker does not support TLS 1.0 or TLS1.1. If you are downgrading from Communications Broker Release 4.2.0 to a release prior to Release 4.2.0, set your tls-version to compatibility.

Downgrade Caveat for NTP Configurations using an FQDN

If you create a realm-configuration for providing resolution of FQDNs for NTP servers using the wancom0 interface, Oracle recommends that you remove this wancom0 realm-config before downgrading to a version that does not support FQDNs for NTP servers.

If you retain this configuration, you will lose SSH and GUI access after the downgrade. To recover from this issue, use console access to remove the wancom0 realm-config. Also, remove the wancom0 phy-interface and network-interface. If you configure FQDN resolution for NTP servers through a media interface, you can downgrade to a version that does not support this resolution without removing the configuration.

During LDAP configuration, Address of the record and look-up queries are not available

SDM: In LDAP configuration, address of the record and look-up queries are not available.

Workaround: Configuration using the Web GUI and ACLI

LDAP SNMP Trap Support

LDAP SNMP traps are not supported in P-CZ 4.2.0. Communications Broker 4.2.0 does not generate any LDAP failures for the following OID failures:
  • 1.3.6.1.4.1.9148.2.1.8.9 apSmgmtLDAPCap
  • 1.3.6.1.4.1.9148.3.2.4.2.10 apSysMgmtLDAPServerStatusGroup
  • 1.3.6.1.4.1.9148.3.2.4.3.15 apSysMgmtLDAPServerStatusNotificationsGroup

HA Limitation

HA switchover causes TCP/TLS ports to be reset. This terminates the TCP/TLS calls that were in progress on the formerly active Communications Broker. New call setup over TCP/TLS, however, is successful.

Logging Limitation

Setting Logging to DEBUG simultaneously with greater than 300k configuration degrades system performance. Be sure to set Logging to WARNING or NOTICE under this condition, and only use DEBUG when absolutely required.

LDAP Support

Only the default "ecb" network can support LDAP. Additional networks cannot.

Registrar Support

Only the default "ecb" network can act as the registrar. Additional networks cannot.

ECB Sync Compatibility

ECB Sync is supported only between nodes with the same configuration platforms. For example, X8-2 to X8-2, X9-2 to X9-2, VM to VM are supported. Both Communications Brokers participating in ECB Sync must have the same number of Cores.

Deprecated Ciphers

The system deprecates the following ciphers, adhering to recent OpenSSL changes intended to eliminate weak ciphers:

  • All DES-CBC ciphers, including:
    • TLS_DHE_RSA_WITH_DES_CBC_SHA
    • TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
Oracle recommends that you remove any prior version configuration that uses these ciphers, and that you do not configure a security profile with the expectation that these ciphers are available. Note also that TLS profiles using the ALL (default) value for the cipher-list parameter no longer use these ciphers.

Note:

The ACLI may still display these ciphers when you run cipher-list ?, but the system does not support them.