Skip to content

Commit 4717ddd

Browse files
Merge pull request #310946 from Harikrishnan-M-B/patch-60
Revise action steps and add cipher suite update guidance
2 parents 84d39c7 + e539508 commit 4717ddd

1 file changed

Lines changed: 13 additions & 3 deletions

File tree

articles/frontdoor/diffie-hellman-ciphers.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,15 @@ You're affected if any of the following are true:
2525

2626
## How will I know if I'm impacted?
2727
* Impacted subscriptions and resources will receive Azure service health notification and email notifications.
28+
* The impacted connection leg ('client to service' or 'service to origin' or both) will be mentioned in the notification.
2829

2930
## What is the impact if I don't act?
3031
* Connections that can only use the retired DHE ciphers will fail the TLS handshake (for clients) or fail on service to origin negotiation (for origins).
3132
* Typical symptoms include handshake failure / no shared cipher errors / invalid cipher error in clients or origin server logs.
3233

3334
## Action required
34-
1. Ensure your origin servers disable DHE ciphers and enable the recommended cipher suites.
35-
2. Inform your clients to disable DHE ciphers and enable the recommended cipher suites.
35+
1. Ensure your origin servers disable DHE ciphers and enable the recommended cipher suites.
36+
3. Inform your clients to disable DHE ciphers and enable the recommended cipher suites.
3637

3738
## Recommended cipher suites
3839
For best compatibility and security on Azure Front Door / Azure CDN endpoints and origins, we recommend using the following cipher suites:
@@ -43,14 +44,23 @@ For best compatibility and security on Azure Front Door / Azure CDN endpoints an
4344
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
4445
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
4546

47+
## Updating cipher suites for common origin types
48+
49+
| Service | Configuration Method |
50+
| -- | -- |
51+
| Azure App Service | [Use TLS/SSL settings to set a "Minimum TLS Version" or use ARM templates for fine-grained cipher control.](../app-service/configure-ssl-bindings.md) |
52+
| Azure Application Gateway | [Create a SSL Policy (Predefined or Custom) to select specific cipher suites.](../application-gateway/application-gateway-ssl-policy-overview.md) |
53+
| Azure API Management | [Modify the Service Instance Settings to disable specific ciphers via the "Protocols and Ciphers" blade.](../api-management/api-management-howto-manage-protocols-ciphers.md) |
54+
55+
4656
## Frequently asked questions
4757
- Does this affect both client and origin connections?
4858

4959
Yes. The retirement applies to both the client to service and service to origin legs. Update both sides to avoid issues.
5060

5161
- What if I still need legacy client compatibility?
5262

53-
Migrate clients to support TLS 1.2/1.3 with ECDHE. If you operate controlled clients, update their TLS policy.
63+
The chances of a modern client or server requiring TLS_DHE ciphers as a "must-have" are extremely low as in most places these ciphers have been replaced with the more secure TLS_ECDHE ciphers. Inform your legacy clients to support TLS 1.2/1.3 with ECDHE. If you operate controlled clients, update their TLS policy.
5464

5565
- Should I make any changes to my Front Door or CDN profiles?
5666

0 commit comments

Comments
 (0)