Uploaded image for project: 'HipChat'
  1. HipChat
  2. HCPUB-536

Update Ciphers for Hipchat Server (On-Prem)

This issue belongs to an archived project. You can view it, but you can't modify it. Learn more

    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      We have setup the on-prem hipchat server and it got flagged on our vulnerability scan for insecure cipher suites. I was told the info was passed on to development and then asked to open the suggestion here so that it could be tracked. Request is to disable TLS1.0 support

      Ciphers flagged:

      Negotiated with the following insecure cipher suites: TLS 1.0
      ciphers: TLS_RSA_WITH_3DES_EDE_CBC_SHA
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      TLS_RSA_WITH_AES_128_CBC_SHA
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      TLS_RSA_WITH_AES_256_CBC_SHA
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

              azelenko Avinoam
              af9462ebb94b Joel Boekankamp
              Archiver:
              mandreacchio Michael Andreacchio

                Created:
                Updated:
                Resolved:
                Archived: