Skip to content

Commit 05136ee

Browse files
authored
Merge pull request #310892 from halkazwini/afd-dhe
DHE FAQ
2 parents 203087b + 3e768bc commit 05136ee

2 files changed

Lines changed: 57 additions & 0 deletions

File tree

articles/frontdoor/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,8 @@
193193
href: classic-retirement-faq.md
194194
- name: Edgio retirement FAQ
195195
href: /previous-versions/azure/cdn/edgio-retirement-faq?toc=/azure/frontdoor/toc.json
196+
- name: DHE Cipher FAQ
197+
href: diffie-hellman-ciphers.md
196198
- name: Security
197199
items:
198200
- name: Secure your Front Door
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: DHE ciphers
3+
titleSuffix: Azure Front Door
4+
description: Learn about how to stop using DHE ciphers on Azure Front Door and CDN
5+
author: halkazwini
6+
ms.author: halkazwini
7+
ms.service: azure-frontdoor
8+
ms.topic: concept-article
9+
ms.date: 01/26/2025
10+
---
11+
12+
# TLS_DHE cipher suites on Azure Front Door and Azure CDN
13+
14+
**Applies to:** :heavy_check_mark: Front Door Standard/Premium :heavy_check_mark: Front Door (classic) :heavy_check_mark: CDN Standard from Microsoft (classic)
15+
16+
On April 1, 2026, Azure Front Door (Standard, Premium, and Classic) and Azure CDN from Microsoft (Classic) services will stop negotiating the following weak DHE cipher suites for both client to service and service to origin TLS connections:
17+
* TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
18+
* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
19+
20+
## Who is affected?
21+
22+
You're affected if any of the following are true:
23+
* Your clients (browsers/agents/devices) must require one of the DHE cipher suites when connecting to your Front Door/CDN endpoint.
24+
* Your origins must require one of the retired DHE cipher suites when Front Door/ CDN connects to your origin.
25+
26+
## How will I know if I'm impacted?
27+
* Impacted subscriptions and resources will receive Azure service health notification and email notifications.
28+
29+
## What is the impact if I don't act?
30+
* Connections that can only use the retired DHE ciphers will fail the TLS handshake (for clients) or fail on service to origin negotiation (for origins).
31+
* Typical symptoms include handshake failure / no shared cipher errors / invalid cipher error in clients or origin server logs.
32+
33+
## Action required
34+
1. Ensure your origin servers disable DHE ciphers and enable the recommended cipher suites.
35+
2. Inform your clients to disable DHE ciphers and enable the recommended cipher suites.
36+
37+
## Recommended cipher suites
38+
For best compatibility and security on Azure Front Door / Azure CDN endpoints and origins, we recommend using the following cipher suites:
39+
* TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
40+
* TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
41+
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
42+
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
43+
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
44+
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
45+
46+
## Frequently asked questions
47+
- Does this affect both client and origin connections?
48+
Yes. The retirement applies to both the client to service and service to origin legs. Update both sides to avoid issues.
49+
- What if I still need legacy client compatibility?
50+
Migrate clients to support TLS 1.2/1.3 with ECDHE. If you operate controlled clients, update their TLS policy.
51+
- Should I make any changes to my Front Door or CDN profiles?
52+
As an optional measure, for Front Door Standard/Premium profiles, you can also use the [Configure Azure Front Door TLS policy](/azure/frontdoor/standard-premium/tls-policy) feature to disable the DHE ciphers in advance before 1 April 2026. This option isn't available for other tiers.
53+
54+
For all Front Door (Standard, Premium, Classic) and Azure CDN from Microsoft (Classic) profiles, Microsoft team will disable the DHE ciphers after 1 April 2026.
55+

0 commit comments

Comments
 (0)