Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Feb 09, 2022 - 10:00 UTC
We are reaching out to inform you that as part of our continuous efforts to improve the security and reliability of our services, We will be disabling weak and insecure cipher suites that are accepted as part of TLS 1.2 handshake
Affected site: CA Start Time: 2022-02-09 10:00 UTC End Time: 2022-02-09 12:00 UTC
Impact: Clients need to make sure there is no dependency on their applications on ciphers that are not listed here.
These are the ciphers that will be allowed. ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-AES256-GCM-SHA384
In case you need further information, please contact technical support at email@example.com.
Posted Jan 17, 2022 - 13:29 UTC
This scheduled maintenance affected: Messaging API - CA (REST).