SNS version 4.3.31 LTSB bug fixes
System
SMC - Encryption suites that can be used with an SNS firewall
Communications between an SNS firewall and its SMC administration server can now use only these encryption suites:
- TLS_AES_128_GCM_SHA256,
- TLS_CHACHA20_POLY1305_SHA256,
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
- TLS_EMPTY_RENEGOTIATION_INFO_SCSV.
These encryption suites have been removed:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256.
Certificates and PKI
The firewall now correctly verifies the content of the basicConstraints extension in a certification authority's (CA) certificate.
You can configure whether to import a CA for which this extension does not have a value, by using the StrictCACheck configuration token found in the ConfigFiles > system file. When the value of this token is set to 0, this means that such CAs can be imported.