Revolving around the core of technology
Document ID: | 5313 |
---|---|
Subject: | How to enable Forward Secrecy for SynaMan/Syncrify |
Creation date: | 9/12/19 11:25 AM |
Last modified on: | 9/12/19 11:29 AM |
This article applies to both SynaMan and Syncrify
ssl.cipher.list=List of commma separated cipher listFor example:
ssl.cipher.list=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
jdk.tls.ephemeralDHKeySize=2048
synametrics.https.sslProtocol=SSLv2Hello,TLSv1.1,TLSv1.2The example above, will only use TLS1.1 and TLS1.2
Do you have a helpful tip related to this document that you'd like to share with other users?