TLS Cipher Updates
Note the following changes to the DEFAULT cipher list.
Oracle recommends the following ciphers, and includes them
		in the DEFAULT cipher list: 
	 
                  
               - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
 - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
 - TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
 - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
 - TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
 - TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
 - TLS_RSA_WITH_AES_256_CBC_SHA256
 
Oracle supports the following ciphers, but does not include them in the
		DEFAULT cipher list: 
	 
                  
               - TLS_RSA_WITH_AES_256_GCM_SHA384
 - TLS_RSA_WITH_AES_128_GCM_SHA256
 - TLS_RSA_WITH_AES_128_CBC_SHA
 - TLS_RSA_WITH_AES_128_CBC_SHA256
 - TLS_RSA_WITH_3DES_EDE_CBC_SHA
 
Oracle supports the following ciphers for debugging purposes only: 
	 
                  
               - TLS_RSA_WITH_NULL_SHA256 (debug only)
 - TLS_RSA_WITH_NULL_SHA (debug only)
 - TLS_RSA_WITH_NULL_MD5 (debug only)
 
Oracle supports the following ciphers, but considers them not secure.
		They are not included in the DEFAULT cipher-list, but they are included when
		you set the 
		cipher-list
		attribute to 
		ALL. Note that they
		trigger 
		verify-config error
		messages. 
	 
                  
               - TLS_DHE_RSA_WITH_AES_256_CBC_SHA
 - TLS_RSA_WITH_AES_256_CBC_SHA
 - TLS_DHE_RSA_WITH_AES_128_CBC_SHA
 - TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
 
To configure TLS ciphers, use the cipher-list attribute in the tls-profile configuration element.
WARNING:
When you set tls-version to either tlsv1 or tlsv11 and you want to use ciphers that Oracle considers not secure, you must manually add them to the cipher-list attribute.Note:
The default is TLSv1.2. Oracle supports TLS1.0 and TLS1.1 for backward compatibility, only, and they may be deprecated in the future.