Skip to content

Commit 357180d

Browse files
authored
Added details about 3DES cipher deprecation
This cipher has no usage and we got approval from breaking change team to update docs to show upcoming deprecation.
1 parent 47bf022 commit 357180d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ For IoT Hubs not configured for TLS 1.2 enforcement, TLS 1.2 still works with th
104104
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
105105
* `TLS_RSA_WITH_AES_256_CBC_SHA`
106106
* `TLS_RSA_WITH_AES_128_CBC_SHA`
107-
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
107+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA` **(This cipher will be deprecated on 10/01/2022 and will no longer be used for TLS handshakes)**
108108

109109
A client can suggest a list of higher cipher suites to use during `ClientHello`. However, some of them might not be supported by IoT Hub (for example, `ECDHE-ECDSA-AES256-GCM-SHA384`). In this case, IoT Hub will try to follow the preference of the client, but eventually negotiate down the cipher suite with `ServerHello`.
110110

0 commit comments

Comments
 (0)