Skip to content

Commit ae816a1

Browse files
Document removed insecure cipher suites (#2656)
1 parent 6cbb620 commit ae816a1

File tree

2 files changed

+29
-2
lines changed

2 files changed

+29
-2
lines changed

modules/ROOT/pages/changes-deprecations-removals.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -650,3 +650,18 @@ The included *neo4j.count* metrics class replaces the deprecated *ids_in_use* me
650650
+
651651
For more information, see xref:monitoring/metrics/reference.adoc#db-data-count-metrics[Monitoring -> Metrics reference] and the tables _Database data count metrics_ and _Database data metrics_ respectively.
652652

653+
654+
[[ssl-framework-changes]]
655+
=== SSL framework
656+
657+
Neo4j 2025.10::
658+
659+
As of 2025.10, the Java 21 default cipher suites that use insecure CBC-based ciphers are removed from Neo4j:
660+
661+
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
662+
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
663+
* TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
664+
* TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
665+
+
666+
However, you still can use them by explicitly specifying their configuration and referencing them in your setup.
667+

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1033,8 +1033,20 @@ One can set up a Neo4j configuration by specifying the list of cipher suites tha
10331033
Valid values depend on the current JRE and SSL provider.
10341034
For Oracle JRE here is the list of supported ones - https://docs.oracle.com/en/java/javase/21/docs/specs/security/standard-names.html#jsse-cipher-suite-names.
10351035
1036-
Note that CBC (cipher block chaining)-based ciphers (RFC 8447), used in TLS v1.2 network encryption, are not supported in 2025.01.
1037-
See xref:changes-deprecations-removals.adoc[] for more information.
1036+
Note that CBC (cipher block chaining)-based ciphers (RFC 8447), used in TLS v1.2 network encryption, are not supported since 2025.01.
1037+
See xref:changes-deprecations-removals.adoc#_ssl_framework[Changes, deprecations, and removals -> Breaking changes in SSL framework] for more information.
1038+
1039+
[CAUTION]
1040+
====
1041+
Starting from 2025.10, the Java 21 default cipher suites that use insecure CBC-based ciphers are removed from Neo4j:
1042+
1043+
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
1044+
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
1045+
* TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
1046+
* TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
1047+
1048+
However, you still can use them by explicitly specifying their configuration and referencing them in your setup.
1049+
====
10381050
10391051
.Bolt
10401052
[source, properties]

0 commit comments

Comments
 (0)