<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS 1.2 Sandbox vs Production in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61872#M36271</link>
    <description>&lt;P&gt;As posted in one of my replies above, even after configuring &lt;STRONG&gt;Unlimited JCE support JDK&lt;/STRONG&gt; 1.7 didn't fix the issue!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Surprisingly, "&lt;STRONG&gt;The same solutions&lt;/STRONG&gt;" are working with sandbox.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dear Authorize.net Support, Your Sandbox and Production are supposed to be in same configurations. But it is not yet. What else needs to be done? Something missing.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2018 16:46:37 GMT</pubDate>
    <dc:creator>kvsunil</dc:creator>
    <dc:date>2018-02-28T16:46:37Z</dc:date>
    <item>
      <title>TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61570#M35999</link>
      <description>&lt;P&gt;We have tested our sandbox instance after explicitly enabling JDK 1.7 to support TLS 1.2 . This worked fine without issues. So we have applied the same for production server. While checking on our production&amp;nbsp;during the temporary TLS 1.2 enablement on Authorize.net production, &amp;nbsp; it is running into the following issue :&amp;nbsp;&lt;SPAN&gt;“javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sandbox Url :&amp;nbsp;&lt;A href="https://test.authorize.net/gateway/transact.dll" target="_blank"&gt;https://test.authorize.net/gateway/transact.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Production Url :&amp;nbsp;&lt;A href="https://secure.authorize.net/gateway/transact.dll" target="_blank"&gt;https://secure.authorize.net/gateway/transact.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like there is something different between Authorize.net Sandbox vs Production. Please advise. Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 20:37:39 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61570#M35999</guid>
      <dc:creator>kvsunil</dc:creator>
      <dc:date>2018-02-08T20:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61587#M36013</link>
      <description>&lt;P&gt;We ran into a similar problem. Here is a partial list of ciphers that work on beta but did not work during the live disablement testing yesterday:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA:ECDH-RSA-AES256-SHA:ECDH-ECDSA-AES256-SHA:AES256-SHA:CAMELLIA256-SHA:PSK-AES256-CBC-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:ECDH-RSA-DES-CBC3-SHA:ECDH-ECDSA-DES-CBC3-SHA:DES-CBC3-SHA:PSK-3DES-EDE-CBC-SHA:KRB5-DES-CBC3-SHA:KRB5-DES-CBC3-MD5:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:DHE-RSA-SEED-SHA:DHE-DSS-SEED-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:ECDH-RSA-AES128-SHA:ECDH-ECDSA-AES128-SHA:AES128-SHA:SEED-SHA:CAMELLIA128-SHA:IDEA-CBC-SHA:PSK-AES128-CBC-SHA:KRB5-IDEA-CBC-SHA:KRB5-IDEA-CBC-MD5:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:ECDH-RSA-RC4-SHA:ECDH-ECDSA-RC4-SHA:RC4-SHA:RC4-MD5:PSK-RC4-SHA:KRB5-RC4-SHA:KRB5-RC4-MD5:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:KRB5-DES-CBC-SHA:KRB5-DES-CBC-MD5:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-KRB5-RC2-CBC-SHA:EXP-KRB5-DES-CBC-SHA:EXP-KRB5-RC2-CBC-MD5:EXP-KRB5-DES-CBC-MD5:EXP-RC4-MD5:EXP-KRB5-RC4-SHA:EXP-KRB5-RC4-MD5&lt;/PRE&gt;&lt;P&gt;It seems like beta is accepting&amp;nbsp;DEFAULT:!TLSv1.0 but live&amp;nbsp;was allowing only DEFAULT:!TLSv1.0:!SSLv3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 16:05:28 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61587#M36013</guid>
      <dc:creator>jantzenw</dc:creator>
      <dc:date>2018-02-09T16:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61657#M36073</link>
      <description>&lt;P&gt;Could someone please advise what actually needs to be setup for JDK 1.7? The settings applied on Sandbox instance works fine as explained above. Whereas the same failed on production during the temporary disablement on February 8th. Please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 01:11:25 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61657#M36073</guid>
      <dc:creator>kvsunil</dc:creator>
      <dc:date>2018-02-13T01:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61732#M36143</link>
      <description>&lt;P&gt;We ran into the same issue.&amp;nbsp; We even tested the sandbox during the&amp;nbsp;disablement period, just to verify that we had things running&amp;nbsp; on the sandbox environment.&amp;nbsp;&lt;BR /&gt;correctly&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We were led to believe that the sandbox would mimic the production environment, following the permanent disablement of the &lt;SPAN&gt;TLS&lt;/SPAN&gt; 1.0/1.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anyone that has found the differences between the sanbox and the temporarily disabled production site?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a ticket open, have done online chats, and had phone calls with no luck so far.&amp;nbsp; Any help would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2018 20:44:19 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61732#M36143</guid>
      <dc:creator>weyco44</dc:creator>
      <dc:date>2018-02-15T20:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61779#M36182</link>
      <description>&lt;P&gt;It seems like mostly this issue is because of JDK 1.7 &lt;SPAN&gt;JCE Unlimited Strength was not enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Enabled&amp;nbsp;JCE Unlimited Strength for JDK 1.7 on dev instance and tested against Authorize.net sandbox. It worked as usual even without this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Enabled&amp;nbsp;the same (JCE Unlimited Strength) on production and waiting Fingers Crossed. Need to check how it goes on Feb 28th! If that works Authorize.net sandbox and production are not on same security base line.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ref: &lt;A href="https://blogs.oracle.com/java-platform-group/diagnosing-tls,-ssl,-and-https" target="_blank"&gt;https://blogs.oracle.com/java-platform-group/diagnosing-tls,-ssl,-and-https&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;"&lt;U&gt;&lt;STRONG&gt;&lt;EM&gt;Example of diagnosing a problem&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;" section.&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;In the case above, the failure occurred during the handshake. The most likely cause for that is algorithm support. The JDK provides a separate package called JCE Unlimited Strength, designed to add stronger algorithm support than what’s available by default.&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;"Adding stronger algorithms: JCE Unlimited Strength"&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; section:&lt;/P&gt;&lt;P&gt;In a high security environment, one way of strengthening algorithms in the JDK is through the JCE Unlimited Strength policy files. In this particular case, replacing those policy files within JDK 7 allows it to use the stronger variants of existing algorithms and connect successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 7 Download :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html" target="_blank"&gt;http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 15:55:44 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61779#M36182</guid>
      <dc:creator>kvsunil</dc:creator>
      <dc:date>2018-02-20T15:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61811#M36211</link>
      <description>&lt;P&gt;Authorizenet's production and snadobx envirnments are clearly different from each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use the same server to test both and the sandbox works but production does not. &amp;nbsp;On Jan 30 we tested successfully against the sandbox, then two minutes later failed against production using &amp;nbsp;Akamai. &amp;nbsp;On Feb 8th we tried the same thing with the non-Akamai gateway and had the same results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since Feb 8th I have been trying to get help from Authorizenet. &amp;nbsp;Yesterday the first reply came saying we were using TLS 1.2 on 1/30 and 2/8. &amp;nbsp; HELOOOOO! &amp;nbsp;We know that. &amp;nbsp;They did not go any futher to look into production versus sandbox.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have used this service for the past 15 yesrs and have never had good support. &amp;nbsp;It is like they are in another universe. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We now have less than 5 days before they turn it off. &amp;nbsp;Obviously they do not care. &amp;nbsp;It is probably more like they are not capable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 16:10:12 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61811#M36211</guid>
      <dc:creator>kornysnaps</dc:creator>
      <dc:date>2018-02-22T16:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61821#M36221</link>
      <description>&lt;P&gt;We have forcefully override tls1.2 version in our application and it is working fine in sandbox without any issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We hope it should also work in production.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 07:43:26 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61821#M36221</guid>
      <dc:creator>raviparmarce88</dc:creator>
      <dc:date>2018-02-23T07:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61833#M36233</link>
      <description>&lt;P&gt;Hi All ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have updated our FAQs for the cipher support&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.authorize.net/authkb/index?page=content&amp;amp;id=A1623&amp;amp;actp=search&amp;amp;viewlocale=en_US&amp;amp;searchid=1519401586050#Support" target="_blank"&gt;https://support.authorize.net/authkb/index?page=content&amp;amp;id=A1623&amp;amp;actp=search&amp;amp;viewlocale=en_US&amp;amp;searchid=1519401586050#Support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cipher support ECDHE and AESGCM&amp;nbsp;are preferred,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SHA-1 ciphers will be not be supported.&lt;/STRONG&gt;&amp;nbsp;For a full list/report SSL Labs report can be run to see and verify TLS version and ciphers supported. Please see below for a matrix of reports available, by API endpoint and environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" cellspacing="1" cellpadding="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Production&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Sandbox&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Transact, Legacy (Non-Akamai)&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=secure.authorize.net" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=secure.authorize.net&lt;/A&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;EM&gt;Not Applicable&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Transact, Akamai&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=secure2.authorize.net" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=secure2.authorize.net&lt;/A&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=test.authorize.net" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=test.authorize.net&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;ANet API, Legacy (Non-Akamai)&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=api.authorize.net" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=api.authorize.net&lt;/A&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;EM&gt;Not Applicable&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;ANet API, Akamai&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=api2.authorize.net" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=api2.authorize.net&lt;/A&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=apitest.authorize.net" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=apitest.authorize.net&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Sat, 24 Feb 2018 08:23:19 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61833#M36233</guid>
      <dc:creator>Anurag</dc:creator>
      <dc:date>2018-02-24T08:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61839#M36239</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please let me know how can we ensure that current production version would work fine after this tls disablement ?&lt;/P&gt;&lt;P&gt;Current application with Sandbox is working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 09:24:26 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61839#M36239</guid>
      <dc:creator>raviparmarce88</dc:creator>
      <dc:date>2018-02-26T09:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61843#M36242</link>
      <description>&lt;P&gt;Has the sandbox been updated to reflect this?&amp;nbsp; Was this how the production version was set up during the Feb 8th test?&amp;nbsp; Was there a mistake made while doing the test run that caused all of these errors for people?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way to verify that we will not lose connection once the Feb. 28th deadline comes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why did it take this long to give any sort of response?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 16:01:48 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61843#M36242</guid>
      <dc:creator>weyco44</dc:creator>
      <dc:date>2018-02-26T16:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61871#M36270</link>
      <description>&lt;P&gt;Our Sandbox tests worked and now our system is not working after the rollout. No good direction from Authorize.net. We're confirmed with our Datacenter, Rackspace, that the server configurations are correct. Basically we're getting a "Status call failed" related to our recurring billing and connection errors for standard purchases. We've removed all weak cyphers and the servers are confirmed TLS 1.2 only. We're desperate. Any ideas?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 16:09:34 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61871#M36270</guid>
      <dc:creator>zigerati</dc:creator>
      <dc:date>2018-02-28T16:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61872#M36271</link>
      <description>&lt;P&gt;As posted in one of my replies above, even after configuring &lt;STRONG&gt;Unlimited JCE support JDK&lt;/STRONG&gt; 1.7 didn't fix the issue!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Surprisingly, "&lt;STRONG&gt;The same solutions&lt;/STRONG&gt;" are working with sandbox.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dear Authorize.net Support, Your Sandbox and Production are supposed to be in same configurations. But it is not yet. What else needs to be done? Something missing.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 16:46:37 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61872#M36271</guid>
      <dc:creator>kvsunil</dc:creator>
      <dc:date>2018-02-28T16:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61879#M36278</link>
      <description>&lt;P&gt;Since no use&amp;nbsp;testing against Authorize.net Sandbox with JDK 1.7 went ahead and tested against Authorize.net production with JDK 1.8. That solved the issue!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now need to setup and test with dev servers and then to production.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authorize.net, any information from your end? &lt;SPAN&gt;Authorize.net Sandbox works with JDK 1.7 but not Production?!? What is the production readiness?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 18:36:22 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61879#M36278</guid>
      <dc:creator>kvsunil</dc:creator>
      <dc:date>2018-02-28T18:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61891#M36290</link>
      <description>&lt;P&gt;We had the same issues with the sandbox vs production and received no help from this service.&amp;nbsp; Fortunately we have been planning to move away from authorizenet and were force to speed this up in the past two weeks.&amp;nbsp; We now have 99% of our clients using another gateway.&amp;nbsp; The 1% that remain do now seem to work in production.&amp;nbsp; My only guess is because we upgraded from java 1.7 to java 1.8 this past Saturday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is a comfort to know that we have cleared this hurdle, but the bad taste lingers. The 1% will remain with authorize because they are lower volume, but we have no intention of coming back with the 99% that have been moved away.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I probably lost 10 years of my life because of this ordeal.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 01:34:26 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61891#M36290</guid>
      <dc:creator>kornysnaps</dc:creator>
      <dc:date>2018-03-01T01:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61915#M36314</link>
      <description>&lt;P&gt;We had a contingency plan to jump ship, similar to what kornysnaps described.&amp;nbsp; This shouldn't be neccessary, but the fear of coming to work and having all eCommerce grind to a halt will put some gray hairs on a head rather quick.&amp;nbsp; It was all ready- could have been done at 2:01AM and we would be a lost customer.&amp;nbsp; There are other payment provider options out there.&amp;nbsp; Authorize.net isn't the only game in town.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To anyone still struggling a suggestion would be to reorder cipher suites.&amp;nbsp; If authorize.net wants to use SHA2 or SHA3 consider putting them at the top of the order.&amp;nbsp; You may not want to leave out any of pre-existing ciphers as, if you are like us, authorize.net isn't the only gateway to talk to.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 15:08:24 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/61915#M36314</guid>
      <dc:creator>weyco44</dc:creator>
      <dc:date>2018-03-01T15:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.2 Sandbox vs Production</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/62051#M36435</link>
      <description>&lt;P&gt;This TSL1.2 upgrade has been bungled by authorize.net.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It turns out that production is different from the configuration deployed in their staging/test which everybody used to validate 1.2 compatibility!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Secondly, even now there is a difference in the TLS / Cipher between their akami production URL &lt;SPAN&gt;(&lt;/SPAN&gt;&lt;A href="https://api2.authorize.net/xml/v1/request.api" target="_blank"&gt;https://&lt;FONT color="#000000"&gt;&lt;STRONG&gt;api2&lt;/STRONG&gt;.&lt;/FONT&gt;authorize.net/xml/v1/request.api&lt;/A&gt;&lt;SPAN&gt;) and the non-akami URL (&lt;A href="https://api.authorize.net/xml/v1/request.api" target="_blank"&gt;https://&lt;STRONG&gt;api&lt;/STRONG&gt;.authorize.net/xml/v1/request.api&lt;/A&gt;). With JDK1.7, we are able to hit staging and akami prod URL, but the very same codebase results in a SSLHandshake exception when targeting the non-akami URL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Per their docs, both endpoints are valid, but it is&amp;nbsp;highly unprofessional that they have different ciphers or configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 12:31:30 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/TLS-1-2-Sandbox-vs-Production/m-p/62051#M36435</guid>
      <dc:creator>LoginId5678</dc:creator>
      <dc:date>2018-03-09T12:31:30Z</dc:date>
    </item>
  </channel>
</rss>

