<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regarding TLS disablement in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58828#M33438</link>
    <description>&lt;P&gt;RC4 is insecure. &lt;A href="https://support.microsoft.com/en-us/help/2868725/microsoft-security-advisory-update-for-disabling-rc4" target="_blank"&gt;https://support.microsoft.com/en-us/help/2868725/microsoft-security-advisory-update-for-disabling-rc4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3DES is slow and weak.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Removing insecure SSL ciphers will vary depending on your operation system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For &lt;STRONG&gt;Windows&lt;/STRONG&gt; you would use&amp;nbsp;the “Run” dialogue box, type “gpedit.msc” and click “OK” to launch the Group Policy Editor. Select Computer Configuration &amp;gt; Administartive Templates &amp;gt; Network &amp;gt; SSL Configuration Settings:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://nexwebsites.com/authorize.net-token-tester/selectSSLCiphers.jpg" border="0" alt="Windows Group policy editor" width="858" height="543" /&gt;&lt;/P&gt;&lt;P&gt;In the right pane , double click on SSL Cipher Suite Order. The default is "Not Configured", select "Enabled", then paste your selected cypher suites into the text box labeled SSL Cipher Suites:&lt;IMG src="https://nexwebsites.com/authorize.net-token-tester/policyEditor.jpg" border="0" alt="Window policy editor" width="701" height="633" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A starting point for your cipher suites would be the following:&lt;/P&gt;&lt;P&gt;TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For Apache webserver&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Open your httpd.conf or ssl.conf file and search for the SSLCipherSuite directive. If you can’t find it anywhere, you can just add it, otherwise, replace it with the following:&lt;BR /&gt;SSLProtocol all -SSLv2 -SSLv3&lt;BR /&gt;SSLCipherSuite ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS&lt;BR /&gt;SSLHonorCipherOrder on&lt;BR /&gt;SSLCompression off&lt;BR /&gt;SSLSessionTickets off&lt;/P&gt;&lt;P&gt;# OCSP Stapling, only in httpd 2.3.3 and later&lt;BR /&gt;SSLUseStapling on&lt;BR /&gt;SSLStaplingResponderTimeout 5&lt;BR /&gt;SSLStaplingReturnResponderErrors off&lt;BR /&gt;SSLStaplingCache shmcb:/var/run/ocsp(128000)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On Nginx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssl_prefer_server_ciphers On;&lt;BR /&gt;ssl_protocols TLSv1 TLSv1.1 TLSv1.2;&lt;BR /&gt;ssl_ciphers ssl_ciphers 'EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH';&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note the list of recommended cipher suites changes, so best practise is to keep apprised of discovered vulnerabilities and current recommendations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wiki.mozilla.org/Security/Server_Side_TLS" target="_blank"&gt;https://wiki.mozilla.org/Security/Server_Side_TLS&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jul 2017 12:36:42 GMT</pubDate>
    <dc:creator>NexusSoftware</dc:creator>
    <dc:date>2017-07-17T12:36:42Z</dc:date>
    <item>
      <title>Regarding TLS disablement</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58826#M33436</link>
      <description>&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;Hello Support Team,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;We received an email notification from Authorize.Net about the TLS disablement on Sandbox and Production environment.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;While performing test credit card transactions from our .NET application on Authorize.Net Sandbox we were getting an error related to TLS because TLS has been disabled on Sandbox environment. To fix this error we have made code changes to support TLS 1.2 in our application as suggested on the blogs and now we can perform test credit card transactions with no issues.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;In addition to TLS disablement, Authorize.Net plans to retire 3DES in production on September 18&lt;/FONT&gt;&lt;FONT color="#000000" face="Calibri" size="2"&gt;th&lt;/FONT&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt; 2017. We referred API Best Practices for cipher recommendations and got to know that by using site &lt;/FONT&gt;&lt;A href="https://www.howsmyssl.com/a/check" target="_blank"&gt;&lt;FONT color="#0563c1" face="Calibri" size="3"&gt;&lt;U&gt;https://www.howsmyssl.com/a/&lt;/U&gt;check&lt;/FONT&gt;&lt;/A&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt; we can validate cipher list.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;From our application, we connect site &lt;/FONT&gt;&lt;A href="https://www.howsmyssl.com/a/check" target="_blank"&gt;&lt;FONT color="#0563c1" face="Calibri" size="3"&gt;&lt;U&gt;https://www.howsmyssl.com/a/&lt;/U&gt;check&lt;/FONT&gt;&lt;/A&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt; and got following JSON response:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;{&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "given_cipher_suites": &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_RSA_WITH_AES_256_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_AES_256_GCM_SHA384", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_AES_128_GCM_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_AES_256_CBC_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_AES_128_CBC_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_AES_256_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_AES_128_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_DSS_WITH_AES_256_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_DSS_WITH_AES_128_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_3DES_EDE_CBC_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA",&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_RC4_128_SHA", &lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_RC4_128_MD5"&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "ephemeral_keys_supported": true,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "session_ticket_supported": true,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "tls_compression_supported": false,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "unknown_cipher_suite_supported": false,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "beast_vuln": false,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "able_to_detect_n_minus_one_splitting": false,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "insecure_cipher_suites": {&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_RC4_128_MD5": ["uses RC4 which has insecure biases in its output"],&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "TLS_RSA_WITH_RC4_128_SHA": ["uses RC4 which has insecure biases in its output"]&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; },&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "tls_version": "TLS 1.2",&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "rating": "Bad"&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;}&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;In the above response, the rating is bad and there are two insecure ciphers related to RC4 but not about 3DES. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;With this current settings, do you think 3DES retirement on Authorize.Net Production will cause any issues within our application while performing credit card transaction via Authorize.Net? If yes, what necessary code changes or server settings we need to configure at application/server level? Please suggest.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="" face="Calibri" size="3"&gt;Thanks,&lt;BR /&gt;Riz&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 10:27:45 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58826#M33436</guid>
      <dc:creator>rizdplex123</dc:creator>
      <dc:date>2017-07-17T10:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding TLS disablement</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58828#M33438</link>
      <description>&lt;P&gt;RC4 is insecure. &lt;A href="https://support.microsoft.com/en-us/help/2868725/microsoft-security-advisory-update-for-disabling-rc4" target="_blank"&gt;https://support.microsoft.com/en-us/help/2868725/microsoft-security-advisory-update-for-disabling-rc4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3DES is slow and weak.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Removing insecure SSL ciphers will vary depending on your operation system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For &lt;STRONG&gt;Windows&lt;/STRONG&gt; you would use&amp;nbsp;the “Run” dialogue box, type “gpedit.msc” and click “OK” to launch the Group Policy Editor. Select Computer Configuration &amp;gt; Administartive Templates &amp;gt; Network &amp;gt; SSL Configuration Settings:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://nexwebsites.com/authorize.net-token-tester/selectSSLCiphers.jpg" border="0" alt="Windows Group policy editor" width="858" height="543" /&gt;&lt;/P&gt;&lt;P&gt;In the right pane , double click on SSL Cipher Suite Order. The default is "Not Configured", select "Enabled", then paste your selected cypher suites into the text box labeled SSL Cipher Suites:&lt;IMG src="https://nexwebsites.com/authorize.net-token-tester/policyEditor.jpg" border="0" alt="Window policy editor" width="701" height="633" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A starting point for your cipher suites would be the following:&lt;/P&gt;&lt;P&gt;TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA256&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For Apache webserver&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Open your httpd.conf or ssl.conf file and search for the SSLCipherSuite directive. If you can’t find it anywhere, you can just add it, otherwise, replace it with the following:&lt;BR /&gt;SSLProtocol all -SSLv2 -SSLv3&lt;BR /&gt;SSLCipherSuite ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS&lt;BR /&gt;SSLHonorCipherOrder on&lt;BR /&gt;SSLCompression off&lt;BR /&gt;SSLSessionTickets off&lt;/P&gt;&lt;P&gt;# OCSP Stapling, only in httpd 2.3.3 and later&lt;BR /&gt;SSLUseStapling on&lt;BR /&gt;SSLStaplingResponderTimeout 5&lt;BR /&gt;SSLStaplingReturnResponderErrors off&lt;BR /&gt;SSLStaplingCache shmcb:/var/run/ocsp(128000)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On Nginx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssl_prefer_server_ciphers On;&lt;BR /&gt;ssl_protocols TLSv1 TLSv1.1 TLSv1.2;&lt;BR /&gt;ssl_ciphers ssl_ciphers 'EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH';&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note the list of recommended cipher suites changes, so best practise is to keep apprised of discovered vulnerabilities and current recommendations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wiki.mozilla.org/Security/Server_Side_TLS" target="_blank"&gt;https://wiki.mozilla.org/Security/Server_Side_TLS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 12:36:42 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58828#M33438</guid>
      <dc:creator>NexusSoftware</dc:creator>
      <dc:date>2017-07-17T12:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding TLS disablement</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58925#M33533</link>
      <description>&lt;P&gt;Thank you for quick response. Just want to confirm, if the recommended configuration settings are not applied on our application server then do we face any issues while performing payment transaction from our application to Authorize.Net gateway?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2017 09:54:24 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58925#M33533</guid>
      <dc:creator>rizdplex123</dc:creator>
      <dc:date>2017-07-21T09:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding TLS disablement</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58931#M33539</link>
      <description>&lt;P&gt;No, you shouldn't have any problem, as cipher suites are only used to negotiate encryption and HMAC algorithms. The cipher suite order determines, starting from the top, which ciphers will be preferred by the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With that being said, though not pertaining directly to your application's interaction with Authorize.net, even if higher grade ciphers are supported and normally used, some misconfiguration in the server can be used to force the use of a weak cipher - or worse no encryption - permitting to an attacker to gain access to the supposed secure communication channel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2017 15:48:59 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Regarding-TLS-disablement/m-p/58931#M33539</guid>
      <dc:creator>NexusSoftware</dc:creator>
      <dc:date>2017-07-21T15:48:59Z</dc:date>
    </item>
  </channel>
</rss>

