Infrastructure Update - TLS Cipher Support from 2025-10-10 03:30 UTC to 2025-10-10 06:30 UTC
Updates
To help keep your data secure, on Friday 10th October 2025, the Aera Technology infrastructure team will be updating the list of TLS ciphers we support. This is part of our ongoing effort to strengthen security and follow current best practices.
Impact:
There will be no outages or downtime from this change.
Most customers will not need to take any action. However, if your systems connect using ciphers that are being retired, those connections will no longer be accepted after the update.
Details:
Current (Old) Cipher List:
Cipher Suite | BoringSSL | Minimum TLS | Algorithm |
---|---|---|---|
[0x9c] | AES128-GCM-SHA256 | 1.2 | RSA |
[Ox3c] | AES128-SHA256 | 1.2 | RSA |
[0x9d] | AES256-GCM-SHA384 | 1.2 | RSA |
[Ox3d] | AES256-SHA256 | 1.2 | RSA |
[Oxc009] | ECDHE-ECDSA-AES128-SHA | 1.0 | ECDSA |
[Oxc013] | ECDHE-RSA-AES128-SHA | 1.0 | RSA |
[Ox2f] | AES128-SHA | 1.0 | RSA |
[Oxc014] | ECDHE-RSA-AES256-SHA | 1.0 | RSA |
[0x35] | AES256-SHA | 1.0 | ECDSA |
[Ox0a] | DES-CBC3-SHA | 1.0 | RSA |
Updated (New) Cipher List:
Cipher Suite | BoringSSL | Minimum TLS | Algorithm |
---|---|---|---|
[Oxc02b] | ECDHE-ECDSA-AES128-GCM-SHA256 | 1.2 | ECDSA |
[Oxcca9] | ECDHE-ECDSA-CHACHA20-POLY1305 | 1.2 | ECDSA |
[Oxc02f] | ECDHE-RSA-AES128-GCM-SHA256 | 1.2 | RSA |
[Oxcca8] | ECDHE-RSA-CHACHA20-POLY1305 | 1.2 | RSA |
[Oxc02c] | ECDHE-ECDSA-AES256-GCM-SHA384 | 1.2 | ECDSA |
[Oxc030] | ECDHE-RSA-AES256-GCM-SHA384 | 1.2 | RSA |
Timing:
This change will be made on Friday 10th October 2025
Action Required:
Please check the updated cipher list against your systems. If you’re already using the supported ciphers, no action is needed. If you are using any of the older ciphers, you’ll need to update your configurations before the change date to avoid connection issues.
If you have any questions, please contact Aera Support by submitting a ticket through Aera Support Portal.
Sincerely,
The Aera Team
← Back