Skip to content

Commit f309458

Browse files
Add deprecation note about CBC-based ciphers (#1962)
1 parent 5b48782 commit f309458

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1084,6 +1084,21 @@ One can set up a Neo4j configuration by specifying the list of cipher suites tha
10841084
Valid values depend on the current JRE and SSL provider.
10851085
For Oracle JRE here is the list of supported ones - https://docs.oracle.com/en/java/javase/17/docs/specs/security/standard-names.html#jsse-cipher-suite-names.
10861086

1087+
[IMPORTANT]
1088+
====
1089+
label:deprecated[Deprecated in 5.26]
1090+
1091+
CBC (cipher block chaining) ciphers, as used in TLS v1.2 network encryption, have several security vulnerabilities that make them less secure than alternative methods.
1092+
The Internet Engineering Task Force (IETF) doesn't recommend using CBC-based ciphers (RFC 8447), and these ciphers were removed from the TLS standard with the development of TLS v1.3.
1093+
1094+
Note that the use of the following CBC-based ciphers has been deprecated in Neo4j 5.26:
1095+
1096+
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
1097+
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
1098+
* TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
1099+
* TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
1100+
====
1101+
10871102
.Bolt
10881103
[source, properties]
10891104
----

0 commit comments

Comments
 (0)