Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Aug 10, 2021 - 06:00 UTC
Scheduled
Dear Client,
We are reaching out to inform you that as part of our continuous efforts to improve the security and reliability of our services, We will be disabling weak and insecure cipher suites that are accepted as part of TLS 1.2 handshake
Affected site: CA Affected FQDNs: ca1.sms.api.sinch.com ca2.sms.api.sinch.com Start Time: 2021-08-10 06:00 UTC End Time: 2021-08-10 08:00 UTC
Impact: Clients need to make sure there is no dependency on their applications on ciphers that are not listed here.
These are the ciphers that will be allowed. ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384
In case you need further information, please contact technical support at support@sinch.com.
Sincerely, Sinch
Posted Jul 30, 2021 - 17:00 UTC
This scheduled maintenance affected: Messaging API - CA (REST).