Cipher Updates

Note the changes to the TLS ciphers and IKE ciphers.

TLS Cipher Updates

The following ciphers may be selected for the cipher-list attribute in the tls-profile configuration element.

TLS 1.0 and TLS 1.1 are not supported in release S-Cz10.0.0.

  • TLS_AES_128_GCM_SHA256
  • TLS_AES_256_GCM_SHA384
  • TLS_AES_128_CCM_SHA256
  • TLS_CHACHA20_POLY1305_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

In addition to these options, you may select DEFAULT, which includes all of the ciphers in this list.

Unsupported TLS Ciphers

Support for the following ciphers, which were available in S-Cz9.3.0 GA but removed in S-Cz9.3.0p3, are not supported in this release:

  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  • TLS_RSA_WITH_AES_256_CBC_SHA256
  • TLS_RSA_WITH_AES_256_GCM_SHA384
  • TLS_RSA_WITH_AES_128_CBC_SHA256
  • TLS_RSA_WITH_AES_128_CBC_SHA
  • TLS_RSA_WITH_AES_128_GCM_SHA256
  • TLS_AES_128_CCM_8_SHA256
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  • TLS_RSA_WITH_AES_256_CBC_SHA
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  • TLS_RSA_WITH_NULL_SHA256
  • TLS_RSA_WITH_NULL_SHA
  • TLS_RSA_WITH_NULL_MD5

IKE Cipher Updates

In the context of IKE negotiations, the Enterprise SBC offers the following ciphers with key lengths of 128, 192, and 256:

  • ENCR-AES-CCM_12
  • ENCR_AES-CCM_8
  • ENCR-AES-CCM_16
  • ENCR_AES_CBC
  • ENCR_AES_CTR