4.4 Supported Cipher Suites
TLS 1.3 supports the following cipher suites:
TLS_AES_128_GCM_SHA256TLS_AES_256_GCM_SHA384TLS_CHACHA20_POLY1305_SHA256TLS_AES_128_CCM_SHA256TLS_AES_128_CCM_8_SHA256
TLS 1.2 supports the following cipher suites:
TLS_RSA_WITH_AES_256_CBC_SHA256TLS_RSA_WITH_AES_256_GCM_SHA384TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384TLS_RSA_WITH_AES_128_CBC_SHA256TLS_RSA_WITH_AES_128_GCM_SHA256TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
JDK determines the default cipher suites for JOLT client. The Java property bea.jolt.tls.ciphersuites can be used to customize the cipher suites used by JOLT client. Customize the cipher suites for other Tuxedo components using the environment variable TM_CIPHERSUITES.
Note:
To enable elliptic curve cipher suites such asTLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, apply the following to the Tuxedo component that acts as a TLS client and/or server:
- Generate an Oracle Wallet that contains elliptic curve keys and certificates, and configure it. For example, the following command generates an elliptic curve private key:
openssl ecparam -name prime256v1 -genkey - Set the environment variable
TM_MIN_PUB_KEY_LENGTH=0
Parent topic: Quick Reference for TLS Support