<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Request for Comments: API Best Practices - test url? in Community Feedback</title>
    <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54383#M393</link>
    <description>Yes, the link is right there in the article:&lt;BLOCKQUOTE&gt;"...you can use a site such as &lt;A href="https://www.howsmyssl.com/" target="_blank"&gt;https://www.howsmyssl.com/&lt;/A&gt; to connect and validate your cipher list"&lt;/BLOCKQUOTE&gt;ericwnyc wrote:&lt;BLOCKQUOTE&gt;Is there a test url we can try a simple post-response to make sure our solution satisfies the new cipher requirements before they go live?&lt;/BLOCKQUOTE&gt;</description>
    <pubDate>Wed, 20 Apr 2016 14:11:41 GMT</pubDate>
    <dc:creator>dkaufman</dc:creator>
    <dc:date>2016-04-20T14:11:41Z</dc:date>
    <item>
      <title>Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53669#M368</link>
      <description>&lt;P&gt;&lt;A href="https://community.developer.cybersource.com/t5/The-Authorize-Net-Developer-Blog/Request-for-Comments-API-Best-Practices/ba-p/53668" target="_self"&gt;We just posted a draft of our upcoming API Best Practices Guide.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Please post your feedback below. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 18:51:39 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53669#M368</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-01-29T18:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53676#M369</link>
      <description>&lt;P&gt;&lt;STRONG&gt;For example, in .NET 4.5, TLS 1.2 is enabled by default. Upgrading to .NET 4.5 should provide your solution with support for TLS 1.2.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That enables it in the platform, but you still need to interact with &lt;FONT face="courier new,courier,monospace"&gt;&lt;SPAN class="typ"&gt;System&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Net&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;ServicePointManager&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;SecurityProtocol = &lt;FONT face="Courier New"&gt;SecurityProtocolType.Tls | SecurityProtocolType.Tls11 | SecurityProtocolType.Tls12;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&amp;nbsp;to enable the use of TLS 1.2 (while keeping TLS 1.0 for other services you may contact that are not yet enabled for modern TLS)&amp;nbsp;on outbound connections, somewhere in your application startup. By default, an &lt;FONT face="courier new,courier,monospace"&gt;HttpWebRequest&lt;/FONT&gt; or WCF client will use only SSL 3.0 and TLS 1.0 for outbound connections. (Inbound connections to your Windows server&amp;nbsp;are controlled by registry settings which are easily managed by a tool called IIS Crypto and are independent of the .NET Framework version.)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://stackoverflow.com/a/29221917/32187" target="_blank"&gt;http://stackoverflow.com/a/29221917/32187&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're unable to make code changes to your application to change the flags passed into &lt;FONT face="courier new,courier,monospace"&gt;SecurityProtocol&lt;/FONT&gt;, you can force all .NET applications on the machine to use TLS 1.2, 1.1, and 1.0 if available by setting a different registry setting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://stackoverflow.com/a/28502562/32187" target="_blank"&gt;http://stackoverflow.com/a/28502562/32187&lt;/A&gt; and &lt;A href="http://stackoverflow.com/a/34009938/32187" target="_blank"&gt;http://stackoverflow.com/a/34009938/32187&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps someone.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jan 2016 14:25:18 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53676#M369</guid>
      <dc:creator>npiasecki</dc:creator>
      <dc:date>2016-01-30T14:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53792#M371</link>
      <description>&lt;P&gt;npiasecki: I was about to post the same thing, nice post. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Best Practices article should be updated to remove this inaccurate text and say something of the following instead "In .NET 4.5, TLS 1.2 is supported, but NOT enabled by default. &amp;nbsp;You must set the SecurityProtocolType to enable TLS 1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is going to be a MAJOR issue come 2017 when Authorize.net disables TLS 1.0 and TLS 1.1 for probably 99% of .NET apps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can personally verify this is an issue since we've run into this exact same problem in a non authorize.net connection and you have to set the flags. &amp;nbsp;Here is another SO article to support:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://stackoverflow.com/questions/28286086/default-securityprotocol-in-net-4-5" target="_blank"&gt;http://stackoverflow.com/questions/28286086/default-securityprotocol-in-net-4-5&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 21:44:42 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53792#M371</guid>
      <dc:creator>mikeada</dc:creator>
      <dc:date>2016-02-18T21:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53813#M372</link>
      <description>&lt;P&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/4658"&gt;@npiasecki﻿&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/19676"&gt;@mikeada﻿&lt;/a&gt;&amp;nbsp;Thank you both for your feedback, and for the excellent point.&lt;BR /&gt;&lt;BR /&gt;When that particular clause was added, it was because there was concern that the API Best Practices was very abstract, and it was hoped that adding that clause about .NET 4.5 would help provide a concrete example useful for developers. But your point is very valid, and we'll take that into consideration when making updates, prior to the final version.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 18:40:41 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53813#M372</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-02-22T18:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53843#M373</link>
      <description>&lt;P&gt;I've updated practice #3 with these specifics:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Note that you may need to make code changes to enable security features of the new security patches. For example, in .NET 4.5, TLS 1.2 is available by default. Upgrading to .NET 4.5, and adding “SecurityProtocolType.Tls12” to the System.Net.ServicePointManager.SecurityProtocol property, should provide your solution with support for TLS 1.2. Please consult your platform and framework documentation for more details.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again for the feedback--and please let us know if you have any more comments or suggestions.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 21:21:59 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53843#M373</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-02-24T21:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53894#M376</link>
      <description>&lt;P&gt;Much better, thank you, that will hopefully save a lot of people some headaches. &amp;nbsp;It's not a well documented problem and Microsoft should probably make it the default IMHO.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2016 19:39:12 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/53894#M376</guid>
      <dc:creator>mikeada</dc:creator>
      <dc:date>2016-03-01T19:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54155#M383</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;I'm following this security update for our Authorize.Net integration, we're using ASP Classic to submit the service &lt;SPAN&gt;post_url =&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://secure2.authorize.net/gateway/transact.dll&amp;nbsp;as" target="_blank"&gt;https://secure2.authorize.net/gateway/transact.dll&amp;nbsp;as&lt;/A&gt; below:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Set objRequest = Server.CreateObject("MSXML2.ServerXMLHTTP")&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;objRequest.open "POST", post_url, false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;objRequest.send post_string&lt;/P&gt;&lt;P&gt;I'm not clear too much about #3, #4, #5 in this article:&lt;/P&gt;&lt;P&gt;#3: Our OS is Window 2012 R2 , when we&amp;nbsp;try to submit to Authorize test environment then it works&lt;/P&gt;&lt;P&gt;&lt;A href="https://test.authorize.net/gateway/transact.dll" target="_blank"&gt;https://test.authorize.net/gateway/transact.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So do we need specify the security protocol like .Net in ASP?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;System.Net.ServicePointManager.SecurityProtocol = SecurityProtocolType.Tls12 , if so can you provide the option in ASP?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;#4:&amp;nbsp;Our&amp;nbsp;checkout feature&amp;nbsp;process payment as above post,&amp;nbsp;with type are CAPTURE_ONLY, CREDIT and VOID payment, that is called our production environment handles payment data? and&amp;nbsp;do we need a DMZ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;#5: "Specifically, you &lt;EM&gt;must not&lt;/EM&gt;&lt;SPAN&gt; count HTTP header lines to determine where the API response begins, as HTTP headers are subject to change without prior notice."-&amp;gt; sorry I'm not clear this too, with our above progress,&amp;nbsp;what we need to update?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Mar 2016 04:00:57 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54155#M383</guid>
      <dc:creator>vantamvtf</dc:creator>
      <dc:date>2016-03-26T04:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54177#M384</link>
      <description>&lt;P&gt;Before I respond, I should make clear this is an API Best Practices document, not an API Requirements doc. While there are strong statements in this document, emphasized by "must" and "must not," it does not presume to cover every situation, and there may be situations when your solution cannot perfectly adhere to these practices.&lt;BR /&gt;&lt;BR /&gt;Regarding your first question re: Practice #3 -- I'll need to do more research into this, as I am not an expert at ASP Classic. But I am somewhat dubious that ASP Classic allows for support of TLS 1.1 or TLS 1.2. Do any forum readers have better information at hand?&lt;BR /&gt;&lt;BR /&gt;Please note that test.authorize.net currently accepts TLS 1.0, 1.1, and 1.2 connections, which means your solution could be using TLS 1.0. We are discussing when to disable TLS 1.0 in Sandbox and will have an announcement date at a later time.&lt;BR /&gt;&lt;BR /&gt;Re: Practice #4 -- DMZs are required if you are handling payment information and storing it, whether in a temporary variable or a permanent database record. They're recommended if you're storing personally identifying information such as people's names, addresses, email addresses, phone numbers, etc. If you aren't storing any such information, there's no need for you to have a DMZ.&lt;BR /&gt;&lt;BR /&gt;Re: Practice #5 -- Some create their own HTTP parsers in the code and make assumptions about how long, or how large, our HTTP headers are. If we make changes to the HTTP headers, their solutions break. If you are using a parser that's baked into your coding framework, there's a good chance that it properly handles headers by looking for the newline. And in that case, you don't have to do a thing differently.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 15:55:16 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54177#M384</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-03-29T15:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54183#M385</link>
      <description>&lt;P&gt;Dear, thank you a lot for your response, it's helpful for me, our system is already enabled TLS1.2 and disabled early TLS.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 09:33:31 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54183#M385</guid>
      <dc:creator>vantamvtf</dc:creator>
      <dc:date>2016-03-30T09:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54195#M386</link>
      <description>&lt;P&gt;I &lt;STRONG&gt;think&lt;/STRONG&gt; our solution satisfies the TLS 1.2 and cipher requirements.&lt;/P&gt;&lt;P&gt;Operative word here is "&lt;STRONG&gt;think&lt;/STRONG&gt;". It is a little scary that we don't know for sure.&lt;/P&gt;&lt;P&gt;Is there a test url we can try a simple post-response to make sure our solution satisfies the new cipher requirements before they go live?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your attention,&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 18:33:19 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54195#M386</guid>
      <dc:creator>ericwnyc</dc:creator>
      <dc:date>2016-03-30T18:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54200#M387</link>
      <description>&lt;P&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/18815"&gt;@ericwnyc﻿&lt;/a&gt;&amp;nbsp;As mentioned last post, these are not hard requirements. Strong suggestions, certainly -- but we are not mandating any changes at this point. The point of this document is to encourage good API implementations and usage that meet or exceed contemporary standards, and so we strongly recommend using TLS 1.2 and ECDHE ciphers.&lt;BR /&gt;&lt;BR /&gt;That said, our intentions are that any changes to our Production API endpoints along these lines, will be preceded by the same change to Sandbox well in advance, so you can test your integrations.&lt;BR /&gt;&lt;BR /&gt;The next anticipated change in Production along these lines, will be for the sunsetting of RC4 ciphers. We don't have a firm schedule for that as of yet. We do plan on removing RC4 support from Sandbox in the near future, and will have a formal announcement in the Developer Community Blog when we have a date planned.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 22:48:23 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54200#M387</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-03-30T22:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54275#M388</link>
      <description>&lt;P&gt;Hi Lilith,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hadn't noticed thatin the announcement. Knowing we will be able to run a test in sandbox before this goes live makes me much more comfortable.&lt;/P&gt;&lt;P&gt;Thanks for the reassurance!&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2016 18:02:57 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54275#M388</guid>
      <dc:creator>ericwnyc</dc:creator>
      <dc:date>2016-04-07T18:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54279#M389</link>
      <description>&lt;P&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/18815"&gt;@ericwnyc﻿&lt;/a&gt;&amp;nbsp;I should have a new announcement about TLS and the new&amp;nbsp;deadline set by the PCI&amp;nbsp;Security Standards Council,&amp;nbsp;by Monday if not sooner. We already have ECDHE ciphers in Sandbox, and we'll bring up RC4 in another announcement, likely next week.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2016 14:52:24 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54279#M389</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-04-08T14:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54332#M390</link>
      <description>&lt;P&gt;What is authorize.net deadline for using TLS 1.2 for all transactions? We use TLS 1.1 and have plans to upgrade our aspdotnetstorefront from 9.3 to 9.5 which would support TLS 1.2 but we will not be upgraded by June 30, 2016.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2016 15:57:54 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54332#M390</guid>
      <dc:creator>EHill</dc:creator>
      <dc:date>2016-04-14T15:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54340#M391</link>
      <description>&lt;P&gt;I apologize for not having the new TLS update out yet.&lt;BR /&gt;&lt;BR /&gt;We're currently rescinding our original early 2017 deadline, and won't be setting a formal deadline until closer to the PCI DSS 2018 deadline.&lt;BR /&gt;&lt;BR /&gt;In the meantime, we're discussing adding resources for testing TLS 1.2 connections, so the formal announcement about the TLS deadline may be delayed until those testing resources are in place.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 16:13:37 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54340#M391</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-04-15T16:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54341#M392</link>
      <description>&lt;P&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/19937"&gt;@EHill﻿&lt;/a&gt;&amp;nbsp;You will have ample time. We originally had a 2017 deadline but have pushed that back to 2018 for the time being.&lt;BR /&gt;&lt;BR /&gt;I anticipate we will have a way for you to test your new TLS 1.2 setup in the next few months -- hopefully even sooner.&lt;BR /&gt;&lt;BR /&gt;That said, we appreciate you updating aspdotnetstorefront as soon as the 9.5 upgrade is available. The security benefits of using TLS 1.2 are significant enough that we don't advise delaying the update, regardless of any deadline we set.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 16:17:17 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54341#M392</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-04-15T16:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54383#M393</link>
      <description>Yes, the link is right there in the article:&lt;BLOCKQUOTE&gt;"...you can use a site such as &lt;A href="https://www.howsmyssl.com/" target="_blank"&gt;https://www.howsmyssl.com/&lt;/A&gt; to connect and validate your cipher list"&lt;/BLOCKQUOTE&gt;ericwnyc wrote:&lt;BLOCKQUOTE&gt;Is there a test url we can try a simple post-response to make sure our solution satisfies the new cipher requirements before they go live?&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Wed, 20 Apr 2016 14:11:41 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54383#M393</guid>
      <dc:creator>dkaufman</dc:creator>
      <dc:date>2016-04-20T14:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54385#M394</link>
      <description>&lt;P&gt;I'm pretty sure&amp;nbsp;&lt;A href="https://www.howsmyssl.com/" target="_blank" rel="nofollow"&gt;https://www.howsmyssl.com/&lt;/A&gt;&amp;nbsp;only tests clients.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2016 16:54:11 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54385#M394</guid>
      <dc:creator>skyetech</dc:creator>
      <dc:date>2016-04-20T16:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54402#M395</link>
      <description>&lt;P&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/7706"&gt;@skyetech﻿&lt;/a&gt;&amp;nbsp;There is an API tab on that site, which explains how you can submit tests directly to their servers, and which would be better suited for API testing in general:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.howsmyssl.com/s/api.html" target="_blank"&gt;https://www.howsmyssl.com/s/api.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Also, it's worth noting that, when we're talking about HTTP, whatever creates the initial request, is considered a client, even if it's running on a server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're in discussions about how to set up TLS 1.2 testing, and once we have our own URLs for testing purposes, we'll make an announcement.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2016 15:24:24 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54402#M395</guid>
      <dc:creator>Lilith</dc:creator>
      <dc:date>2016-04-21T15:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: Request for Comments: API Best Practices - test url?</title>
      <link>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54404#M396</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/7176"&gt;@Lilith&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, it's worth noting that, when we're talking about HTTP, whatever creates the initial request, is considered a client, even if it's running on a server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'll have to learn more about this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran &lt;A href="https://www.howsmyssl.com" target="_blank"&gt;https://www.howsmyssl.com&lt;/A&gt; using Chrome on a Server 2003 box and the result said&amp;nbsp;"Your client doesn't use any cipher suites that are known to be insecure". I didn't think&amp;nbsp;that could be true on Server 2003. If I run&amp;nbsp;it with IE and I get "Your client supports cipher suites that are known to be insecure".&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2016 16:38:35 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Community-Feedback/Request-for-Comments-API-Best-Practices/m-p/54404#M396</guid>
      <dc:creator>skyetech</dc:creator>
      <dc:date>2016-04-21T16:38:35Z</dc:date>
    </item>
  </channel>
</rss>

